Sciweavers

5005 search results - page 980 / 1001
» The Design and Analysis of Parallel Algorithms
Sort
View
JCDL
2005
ACM
161views Education» more  JCDL 2005»
15 years 3 months ago
Downloading textual hidden web content through keyword queries
An ever-increasing amount of information on the Web today is available only through search interfaces: the users have to type in a set of keywords in a search form in order to acc...
Alexandros Ntoulas, Petros Zerfos, Junghoo Cho
MM
2005
ACM
187views Multimedia» more  MM 2005»
15 years 3 months ago
Augmented segmentation and visualization for presentation videos
We investigate methods of segmenting, visualizing, and indexing presentation videos by both audio and visual data. The audio track is segmented by speaker, and augmented with key ...
Alexander Haubold, John R. Kender
82
Voted
MOBICOM
2005
ACM
15 years 3 months ago
MAP: medial axis based geometric routing in sensor networks
One of the challenging tasks in the deployment of dense wireless networks (like sensor networks) is in devising a routing scheme for node to node communication. Important consider...
Jehoshua Bruck, Jie Gao, Anxiao Jiang
SIGCOMM
2005
ACM
15 years 3 months ago
On the predictability of large transfer TCP throughput
Predicting the throughput of large TCP transfers is important for a broad class of applications. This paper focuses on the design, empirical evaluation, and analysis of TCP throug...
Qi He, Constantinos Dovrolis, Mostafa H. Ammar
CCS
2005
ACM
15 years 3 months ago
Automatic placement of authorization hooks in the linux security modules framework
We present a technique for automatic placement of authorization hooks, and apply it to the Linux security modules (LSM) framework. LSM is a generic framework which allows diverse ...
Vinod Ganapathy, Trent Jaeger, Somesh Jha