Sciweavers

882 search results - page 95 / 177
» Improving the Efficiency of Workflow Analysis
Sort
View
TIP
2010
107views more  TIP 2010»
14 years 4 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
PPOPP
2010
ACM
15 years 7 months ago
The LOFAR correlator: implementation and performance analysis
LOFAR is the first of a new generation of radio telescopes. Rather than using expensive dishes, it forms a distributed sensor network that combines the signals from many thousands...
John W. Romein, P. Chris Broekema, Jan David Mol, ...
JCDL
2009
ACM
133views Education» more  JCDL 2009»
15 years 4 months ago
Cost and benefit analysis of mediated enterprise search
The utility of an enterprise search system is determined by three key players: the information retrieval (IR) system (the search engine), the enterprise users, and the service pro...
Mingfang Wu, James A. Thom, Andrew Turpin, Ross Wi...
CORR
2008
Springer
137views Education» more  CORR 2008»
14 years 10 months ago
Counteracting Byzantine Adversaries with Network Coding: An Overhead Analysis
Network coding increases throughput and is robust against failures and erasures. However, since it allows mixing of information within the network, a single corrupted packet genera...
MinJi Kim, Muriel Médard, João Barro...
TCSV
2008
102views more  TCSV 2008»
14 years 9 months ago
Semantic Analysis for Automatic Event Recognition and Segmentation of Wedding Ceremony Videos
Wedding is one of the most important ceremonies in our lives. It symbolizes the birth and creation of a new family. In this paper, we present a system for automatically segmenting ...
Wen-Huang Cheng, Yung-Yu Chuang, Yin-Tzu Lin, Chi-...