Sciweavers

23988 search results - page 4524 / 4798
» Social Network Computing
Sort
View
HOTI
2005
IEEE
15 years 10 months ago
Hybrid Cache Architecture for High Speed Packet Processing
: The exposed memory hierarchies employed in many network processors (NPs) are expensive in terms of meeting the worst-case processing requirement. Moreover, it is difficult to ef...
Zhen Liu, Kai Zheng, Bin Liu
150
Voted
IAT
2005
IEEE
15 years 10 months ago
Real-time Cooperative Multi-target Tracking by Dense Communication among Active Vision Agents
We have proposed a real-time multi-target tracking system by cooperative behaviors of Active Vision Agents (AVAs), where an AVA is a logical model of a networkconnected computer w...
Norimichi Ukita
ICDM
2005
IEEE
190views Data Mining» more  ICDM 2005»
15 years 10 months ago
Neighborhood Formation and Anomaly Detection in Bipartite Graphs
Many real applications can be modeled using bipartite graphs, such as users vs. files in a P2P system, traders vs. stocks in a financial trading system, conferences vs. authors ...
Jimeng Sun, Huiming Qu, Deepayan Chakrabarti, Chri...
148
Voted
ICITA
2005
IEEE
15 years 10 months ago
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
Oge Marques, Pierre Baillargeon
ICMCS
2005
IEEE
94views Multimedia» more  ICMCS 2005»
15 years 10 months ago
Video booklet
In this paper, we propose a novel system, Video Booklet, which enables efficient and nature video browsing and searching. In the system, a set of selected thumbnails excerpted fro...
Xian-Sheng Hua, Shipeng Li, Hong-Jiang Zhang
« Prev « First page 4524 / 4798 Last » Next »