Sciweavers

6833 search results - page 1311 / 1367
» Some two-character sets
Sort
View
ACMDIS
2010
ACM
14 years 10 months ago
The CLOTHO project: predicting application utility
When using the computer, each user has some notion that "these applications are important" at a given point in time. We term this subset of applications that the user va...
Joshua M. Hailpern, Nicholas Jitkoff, Joseph Subid...
MM
2010
ACM
148views Multimedia» more  MM 2010»
14 years 10 months ago
TwitterSigns: microblogging on the walls
In this paper we present TwitterSigns, an approach to display microblogs on public displays. Two different kinds of microblog entries (tweets) are selected for display: Tweets tha...
Markus Buzeck, Jörg Müller
SIGCOMM
2010
ACM
14 years 10 months ago
Circumventing censorship with collage
Oppressive regimes and even democratic governments restrict Internet access. Existing anti-censorship systems often require users to connect through proxies, but these systems are...
Sam Burnett, Nick Feamster, Santosh Vempala
SIGCOMM
2010
ACM
14 years 10 months ago
Theory and new primitives for safely connecting routing protocol instances
Recent studies have shown that the current primitives for connecting multiple routing protocol instances (OSPF 1, OSPF 2, EIGRP 10, etc.) are pervasively deployed in enterprise ne...
Franck Le, Geoffrey G. Xie, Hui Zhang
ICIP
2007
IEEE
14 years 10 months ago
Information-Based Color Feature Representation for Image Classification
1 For the image classification task, the color histogram is widely used as an important color feature indicating the content of the image. However, the high-resolution color histog...
Shi-Lin Wang, Alan Wee-Chung Liew
« Prev « First page 1311 / 1367 Last » Next »