Sciweavers

13180 search results - page 2300 / 2636
» Network Models
Sort
View
MM
2009
ACM
233views Multimedia» more  MM 2009»
15 years 9 months ago
Enhancing semantic and geographic annotation of web images via logistic canonical correlation regression
Photo community sites such as Flickr and Picasa Web Album host a massive amount of personal photos with millions of new photos uploaded every month. These photos constitute an ove...
Liangliang Cao, Jie Yu, Jiebo Luo, Thomas S. Huang
ASPDAC
2000
ACM
104views Hardware» more  ASPDAC 2000»
15 years 9 months ago
Design of digital neural cell scheduler for intelligent IB-ATM switch
— We present the architecture of the ATM banyan switch composed of pattern process and high-speed digital neural cell scheduler. An input buffer type ATM switch with a window-bas...
J.-K. Lee, Seung-Min Lee, Mike Myung-Ok Lee, D.-W....
MOBICOM
2000
ACM
15 years 9 months ago
Pushing dependent data in clients-providers-servers systems
In satellite and wireless networks and in advanced traffic information systems in which the up-link bandwidth is very limited, a server broadcasts data files in a round-robin man...
Amotz Bar-Noy, Joseph Naor, Baruch Schieber
SC
2000
ACM
15 years 9 months ago
Expressing and Enforcing Distributed Resource Sharing Agreements
Advances in computing and networking technology, and an explosion in information sources has resulted in a growing number of distributed systems getting constructed out of resourc...
Tao Zhao, Vijay Karamcheti
156
Voted
LICS
1999
IEEE
15 years 9 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
« Prev « First page 2300 / 2636 Last » Next »