Sciweavers

23988 search results - page 4667 / 4798
» Social Network Computing
Sort
View
120
Voted
ICDCS
2006
IEEE
15 years 9 months ago
ASAP: an AS-Aware Peer-Relay Protocol for High Quality VoIP
Peer-to-peer (P2P) technology has been successfully applied in Internet telephony or Voice over Internet Protocol (VoIP), such as the Skype system, where P2P is used for both sear...
Shansi Ren, Lei Guo, Xiaodong Zhang
203
Voted
IJCNN
2006
IEEE
15 years 9 months ago
Improved Snake Model for Fast Image Segmentation
—This paper presents an Improved Snake Model (ISM) effective for performing fast image segmentation. The work takes advantage of two well-known snake models of Balloon [1] and GG...
Chi-Cheng Ting, Jhan-Syuan Yu, Jiun-Shuen Tzeng, J...
129
Voted
RTCSA
2006
IEEE
15 years 9 months ago
Systematic Security and Timeliness Tradeoffs in Real-Time Embedded Systems
Real-time embedded systems are increasingly being networked. In distributed real-time embedded applications, e.g., electric grid management and command and control applications, i...
Kyoung-Don Kang, Sang Hyuk Son
175
Voted
ETRA
2006
ACM
198views Biometrics» more  ETRA 2006»
15 years 9 months ago
Perceptual attention focus prediction for multiple viewers in case of multimedia perceptual compression with feedback delay
Human eyes have limited perception capabilities. Only 2 degrees of our 180 degree vision field provide the highest quality of perception. Due to this fact the idea of perceptual a...
Oleg Komogortsev, Javed I. Khan
IMC
2006
ACM
15 years 9 months ago
A multifaceted approach to understanding the botnet phenomenon
The academic community has long acknowledged the existence of malicious botnets, however to date, very little is known about the behavior of these distributed computing platforms....
Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, And...
« Prev « First page 4667 / 4798 Last » Next »