Sciweavers

683 search results - page 35 / 137
» Vulnerability Analysis of High Dimensional Complex Systems
Sort
View
94
Voted
ICDCS
2006
IEEE
15 years 6 months ago
ASAP: an AS-Aware Peer-Relay Protocol for High Quality VoIP
Peer-to-peer (P2P) technology has been successfully applied in Internet telephony or Voice over Internet Protocol (VoIP), such as the Skype system, where P2P is used for both sear...
Shansi Ren, Lei Guo, Xiaodong Zhang
91
Voted
IEEECIT
2005
IEEE
15 years 6 months ago
Case Study: Distance-Based Image Retrieval in the MoBIoS DBMS
Similarity search leveraging distance-based index structures is increasingly being used for complex data types. It has been shown that for high dimensional uniform vectors with si...
Rui Mao, Wenguo Liu, Daniel P. Miranker, Qasim Iqb...
96
Voted
INFOCOM
2006
IEEE
15 years 6 months ago
The Index Poisoning Attack in P2P File Sharing Systems
— P2P file-sharing systems have indexes, which users search to find locations of desired titles. In the index poisoning attack, the attacker inserts massive numbers of bogus re...
Jian Liang, Naoum Naoumov, Keith W. Ross
IPPS
2002
IEEE
15 years 5 months ago
System-Level Analysis for MPEG-4 Decoding on a Multi-Processor Architecture
The convergence of TV and new features such as Internet and games, requires a generic media-processing platform, that enables simultaneous execution of very diverse tasks, ranging...
Egbert G. T. Jaspers, Erik B. van der Tol, Peter H...
ICCV
2009
IEEE
1363views Computer Vision» more  ICCV 2009»
16 years 5 months ago
Human Detection Using Partial Least Squares Analysis
Significant research has been devoted to detecting people in images and videos. In this paper we describe a human detection method that augments widely used edge-based features ...
William Robson Schwartz, Aniruddha Kembhavi, David...