Sciweavers

5410 search results - page 964 / 1082
» When to Cross Over
Sort
View
114
Voted
IMC
2004
ACM
15 years 6 months ago
Characteristics of internet background radiation
Monitoring any portion of the Internet address space reveals incessant activity. This holds even when monitoring traffic sent to unused addresses, which we term “background rad...
Ruoming Pang, Vinod Yegneswaran, Paul Barford, Ver...
JCDL
2004
ACM
134views Education» more  JCDL 2004»
15 years 6 months ago
Exploring the relationship between personal and public annotations
Today people typically read and annotate printed documents even if they are obtained from electronic sources like digital libraries. If there is a reason for them to share these p...
Catherine C. Marshall, A. J. Bernheim Brush
92
Voted
MM
2004
ACM
158views Multimedia» more  MM 2004»
15 years 6 months ago
"Sousveillance": inverse surveillance in multimedia imaging
This is a personal narrative that began 30 years ago as a childhood hobby, of wearing and implanting various sensors, effectors, and multimedia computation in order to re-define...
Steve Mann
MM
2004
ACM
117views Multimedia» more  MM 2004»
15 years 6 months ago
Optimized mesh and texture multiplexing for progressive textured model transmission
An optimized scheme of multiplexing coded mesh and texture data to facilitate progressive transmission of 3D textured models is proposed in this work. The mesh and texture data of...
Sheng Yang, Chao-Hua Lee, C. C. Jay Kuo
108
Voted
MSWIM
2004
ACM
15 years 6 months ago
IEEE 802.11 rate adaptation: a practical approach
Today, three different physical (PHY) layers for the IEEE 802.11 WLAN are available (802.11a/b/g); they all provide multi-rate capabilities. To achieve a high performance under v...
Mathieu Lacage, Mohammad Hossein Manshaei, Thierry...