Sciweavers

2724 search results - page 378 / 545
» Optimizing Queries on Files
Sort
View
160
Voted
TSMC
2002
134views more  TSMC 2002»
15 years 3 months ago
Incorporating soft computing techniques into a probabilistic intrusion detection system
There are a lot of industrial applications that can be solved competitively by hard computing, while still requiring the tolerance for imprecision and uncertainty that can be explo...
Sung-Bae Cho
136
Voted
IEEECIT
2010
IEEE
15 years 2 months ago
Parallel Best Neighborhood Matching Algorithm Implementation on GPU Platform
—Error concealment restores the visual integrity of image content that has been damaged due to a bad network transmission. Best neighborhood matching (BNM) is an effective image ...
Guangyong Zhang, Liqiang He, Yanyan Zhang
142
Voted
SOCIALCOM
2010
15 years 1 months ago
Measurement, Modeling, and Analysis of a Large-scale Blog Sever Workload
Despite the growing popularity of Online Social Networks (OSNs), the workload characteristics of OSN servers, such as those hosting blog services, are not well understood. Understa...
Myeongjae Jeon, Jeaho Hwang, Youngjae Kim, Jae-Wan...
148
Voted
ICMCS
2009
IEEE
98views Multimedia» more  ICMCS 2009»
15 years 1 months ago
Scalability of HTTP pacing with intelligent bursting
While streaming protocols like RTSP/RTP have continued to evolved, HTTP has remained a primary method for Web-based video retrieval. The ubiquity and simplicity of HTTP makes it a...
Kevin J. Ma, Radim Bartos, Swapnil Bhatia
144
Voted
VEE
2012
ACM
200views Virtualization» more  VEE 2012»
13 years 11 months ago
Block storage virtualization with commodity secure digital cards
Smartphones, tablets and other mobile platforms typically accommodate bulk data storage with low-cost, FAT-formatted Secure Digital cards. When one uses a mobile device to run a f...
Harvey Tuch, Cyprien Laplace, Kenneth C. Barr, Bi ...