Sciweavers

19832 search results - page 3855 / 3967
» The Korrontea Data Modeling
Sort
View
CN
2007
80views more  CN 2007»
15 years 1 months ago
Receiver-centric congestion control with a misbehaving receiver: Vulnerabilities and end-point solutions
Receiver-driven TCP protocols delegate key congestion control functions to receivers. Their goal is to exploit information available only at receivers in order to improve latency ...
Aleksandar Kuzmanovic, Edward W. Knightly
IPM
2008
196views more  IPM 2008»
15 years 1 months ago
Author identification: Using text sampling to handle the class imbalance problem
Authorship analysis of electronic texts assists digital forensics and anti-terror investigation. Author identification can be seen as a single-label multi-class text categorizatio...
Efstathios Stamatatos
93
Voted
ISCI
2008
93views more  ISCI 2008»
15 years 1 months ago
Safety, domain independence and translation of complex value database queries
This paper considers the theory of database queries on the complex value data model with external functions. Motivated by concerns regarding query evaluation, we first identify re...
Hong-Cheu Liu, Jeffrey Xu Yu, Weifa Liang
IJCV
2006
110views more  IJCV 2006»
15 years 1 months ago
Multi-body Factorization with Uncertainty: Revisiting Motion Consistency
Dynamic analysis of video sequences often relies on the segmentation of the sequence into regions of consistent motions. Approaching this problem requires a definition of which mo...
Lihi Zelnik-Manor, Moshe Machline, Michal Irani
IJCV
2006
107views more  IJCV 2006»
15 years 1 months ago
Image Deblurring in the Presence of Impulsive Noise
Consider the problem of image deblurring in the presence of impulsive noise. Standard image deconvolution methods rely on the Gaussian noise model and do not perform well with imp...
Leah Bar, Nahum Kiryati, Nir A. Sochen
« Prev « First page 3855 / 3967 Last » Next »