Sciweavers

19130 search results - page 3567 / 3826
» Modelling multi-path problems
Sort
View
CN
2007
116views more  CN 2007»
15 years 3 months ago
Scalability and security in biased many-to-one communication
In multicast communication, a source transmits the same content to a set of receivers. Current protocols for multicast follow a tree communication model which makes them scalable....
Francesc Sebé, Josep Domingo-Ferrer
CN
2007
137views more  CN 2007»
15 years 3 months ago
AID: A global anti-DoS service
Distributed denial of service (DDoS) has long been an open security problem of the Internet. Most proposed solutions require the upgrade of routers across the Internet, which is e...
Shigang Chen, Yibei Ling, Randy Chow, Ye Xia
IPM
2008
100views more  IPM 2008»
15 years 3 months ago
Query-level loss functions for information retrieval
Many machine learning technologies such as support vector machines, boosting, and neural networks have been applied to the ranking problem in information retrieval. However, since...
Tao Qin, Xu-Dong Zhang, Ming-Feng Tsai, De-Sheng W...
IJCV
2006
121views more  IJCV 2006»
15 years 3 months ago
Feature-Based Sequence-to-Sequence Matching
This paper studies the problem of matching two unsynchronized video sequences of the same dynamic scene, recorded by different stationary uncalibrated video cameras. The matching i...
Yaron Caspi, Denis Simakov, Michal Irani
141
Voted
IJCV
2006
261views more  IJCV 2006»
15 years 3 months ago
Non-Rigid Stereo Factorization
In this paper we address the problem of recovering 3D non-rigid structure from a sequence of images taken with a stereo pair. We have extended existing non-rigid factorization algo...
Alessio Del Bue, Lourdes de Agapito
« Prev « First page 3567 / 3826 Last » Next »