Sciweavers

1969 search results - page 332 / 394
» Incremental Processing and Acceptability
Sort
View
MIR
2010
ACM
176views Multimedia» more  MIR 2010»
15 years 5 months ago
Object-based tag propagation for semi-automatic annotation of images
Over the last few years, social network systems have greatly increased users’ involvement in online content creation and annotation. Since such systems usually need to deal with...
Ivan Ivanov, Peter Vajda, Lutz Goldmann, Jong-Seok...
92
Voted
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
15 years 5 months ago
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior
Abstract. “Secure Device Pairing” is the process of bootstrapping secure communication between two devices over a short- or medium-range wireless channel (such as Bluetooth, Wi...
Nitesh Saxena, Md. Borhan Uddin
81
Voted
DEXA
2009
Springer
127views Database» more  DEXA 2009»
15 years 5 months ago
The Real Performance Drivers behind XML Lock Protocols
Abstract. Fine-grained lock protocols should allow for highly concurrent transaction processing on XML document trees, which is addressed by the taDOM lock protocol family enabling...
Sebastian Bächle, Theo Härder
94
Voted
NDSS
2008
IEEE
15 years 5 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
76
Voted
ICMCS
2006
IEEE
159views Multimedia» more  ICMCS 2006»
15 years 5 months ago
Image Vector Quantization Indices Recovery using Lagrange Interpolation
Vector quantization (VQ) is an efficient coding algorithm due to its fast decoding efficiency. Indices of VQ will be lost during the transmission because of the signal interferenc...
Yung-Gi Wu, Chia-Hao Wu