Sciweavers

4335 search results - page 473 / 867
» Privatizing Constraint Optimization
Sort
View
ICMCS
2006
IEEE
141views Multimedia» more  ICMCS 2006»
15 years 11 months ago
Ripple-Stream: Safeguarding P2P Streaming Against Dos Attacks
— Compared with file-sharing and distributed hash table (DHT) network, P2P streaming is more vulnerable to denial of service (DoS) attacks because of its high bandwidth demand a...
Wenjie Wang, Yongqiang Xiong, Qian Zhang, Sugih Ja...
ICCV
2005
IEEE
15 years 10 months ago
Non-Negative Lighting and Specular Object Recognition
Recognition of specular objects is particularly difficult because their appearance is much more sensitive to lighting changes than that of Lambertian objects. We consider an appr...
Sameer Shirdhonkar, David W. Jacobs
ICMCS
2005
IEEE
87views Multimedia» more  ICMCS 2005»
15 years 10 months ago
Performance of Multiple Description Coding in Sensor Networks with Finite Buffers
Sensor networks are usually dense networks where the network diversity can be exploited in order to overcome failures. In this paper, we study the use of multiple description tech...
Enrico Baccaglini, Guillermo Barrenetxea, Baltasar...
ADBIS
2004
Springer
124views Database» more  ADBIS 2004»
15 years 10 months ago
Database Caching - Towards a Cost Model for Populating Cache Groups
Web caching keeps single Web objects ready somewhere in caches in the user-to-server path, whereas database caching uses fullfledged database management systems as caches to adapt...
Theo Härder, Andreas Bühmann
IAT
2003
IEEE
15 years 10 months ago
Agent-based decision support for actual-world procurement scenarios
Multi-item, multi-unit negotiations in industrial procurement pose serious challenges to buying agents when trying to determine the best set of providering agents’ offers. Typic...
Juan A. Rodríguez-Aguilar, Andrea Giovannuc...