Sciweavers

3091 search results - page 217 / 619
» The Color Between Two Others
Sort
View
ISCAS
2002
IEEE
94views Hardware» more  ISCAS 2002»
15 years 9 months ago
Video transport over ad-hoc networks using multiple paths
Enabling video transport over ad-hoc networks is more challenging than over other wireless networks because a connection path in an ad-hoc network is highly error-prone and a path...
Shunan Lin, Yao Wang, Shiwen Mao, Shivendra S. Pan...
GLOBECOM
2009
IEEE
15 years 8 months ago
Design and Provisioning of WDM Networks for Many-to-Many Traffic Grooming
A large number of network applications today allow several users to interact together using the many-to-many service mode. A many-to-many session consists of group of users (we ref...
Mohammad A. Saleh, Ahmed E. Kamal
SIGIR
2010
ACM
14 years 10 months ago
Efficient partial-duplicate detection based on sequence matching
With the ever-increasing growth of the Internet, numerous copies of documents become serious problem for search engine, opinion mining and many other web applications. Since parti...
Qi Zhang, Yue Zhang, Haomin Yu, Xuanjing Huang
IDEAS
2007
IEEE
148views Database» more  IDEAS 2007»
15 years 10 months ago
Adaptive Execution of Stream Window Joins in a Limited Memory Environment
A sliding window join (SWJoin) is becoming an integral operation in every stream data management system. In some streaming applications the increasing volume of streamed data as w...
Fatima Farag, Moustafa A. Hammad
SP
2003
IEEE
107views Security Privacy» more  SP 2003»
15 years 9 months ago
Anomaly Detection Using Call Stack Information
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...