Sciweavers

5499 search results - page 996 / 1100
» Generalized Rewrite Theories
Sort
View
86
Voted
IWCMC
2006
ACM
15 years 6 months ago
Effect of payload length variation and retransmissions on multimedia in 802.11a WLANs
Multimedia transmission over wireless local area networks is challenging due to the varying nature of the wireless channel as well as the inherent difference between multimedia a...
Sayantan Choudhury, Irfan Sheriff, Jerry D. Gibson...
87
Voted
JCDL
2006
ACM
71views Education» more  JCDL 2006»
15 years 6 months ago
Using controlled query generation to evaluate blind relevance feedback algorithms
Currently in document retrieval there are many algorithms each with different strengths and weakness. There is some difficulty, however, in evaluating the impact of the test quer...
Chris Jordan, Carolyn R. Watters, Qigang Gao
103
Voted
ML
2006
ACM
103views Machine Learning» more  ML 2006»
15 years 6 months ago
Type-safe distributed programming for OCaml
Existing ML-like languages guarantee type-safety, ensuring memty and protecting the invariants of abstract types, but only within single executions of single programs. Distributed...
John Billings, Peter Sewell, Mark R. Shinwell, Rok...
125
Voted
MM
2006
ACM
203views Multimedia» more  MM 2006»
15 years 6 months ago
Learning image manifolds by semantic subspace projection
In many image retrieval applications, the mapping between highlevel semantic concept and low-level features is obtained through a learning process. Traditional approaches often as...
Jie Yu, Qi Tian
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
15 years 6 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott