Search
Now showing items 121-130 of 319
A distributed approach for bitrate selection in HTTP adaptive streaming
(ACM, 2018)
Past research has shown that concurrent HTTP adaptive streaming (HAS) players behave selfishly and the resulting competition for shared resources leads to underutilization or oversubscription of the network, presentation ...
Reasoning with uncertain information and trust
(SPIE, 2013)
A limitation of standard Description Logics is its inability to reason with uncertain and vague knowledge. Although probabilistic and fuzzy extensions of DLs exist, which provide an explicit representation of uncertainty, ...
A generalized stereotype learning approach and its instantiation in trust modeling
(Elsevier, 2018-08)
Owing to the lack of historical data regarding an entity in online communities, a user may rely on stereotyping to estimate its behavior based on historical data about others. However, these stereotypes cannot accurately ...
Data stream analytics and mining in the cloud
(IEEE, 2012)
Due to prevalent use of sensors and network monitoring tools, big volumes of data or “big data” today traverse the enterprise data processing pipelines in a streaming fashion. While some companies prefer to deploy their ...
Quickly starting media streams using QUIC
(Association for Computing Machinery, Inc, 2018-06-12)
Originally proposed by Google, QUIC is a low-latency transport protocol currently being developed and specified in the IETF. QUIC's low-latency, improved congestion control, multiplexing features are promising and may help ...
Finding event correlations in federated wireless sensor networks
(IEEE, 2011)
Event correlation engines help us find events of interest inside raw sensor data streams and help reduce the data volume, simultaneously. This paper discusses some of the challenges faced in finding event correlations over ...
E-Cube: multi-dimensional event sequence processing using concept and pattern hierarchies
(IEEE, 2010)
Many modern applications including tag based mass transit systems, RFID-based supply chain management systems and online financial feeds require special purpose event stream processing technology to analyze vast amounts ...
Rethinking frequency opponent modeling in automated negotiation
(Springer International Publishing, 2017)
Frequency opponent modeling is one of the most widely used opponent modeling techniques in automated negotiation, due to its simplicity and its good performance. In fact, it outperforms even more complex mechanisms like ...
Hierarchically constrained 3D hand pose estimation using regression forests from single frame depth data
(Elsevier, 2014-12-01)
The emergence of inexpensive 2.5D depth cameras has enabled the extraction of the articulated human body pose. However, human hand skeleton extraction still stays as a challenging problem since the hand contains as many ...
Shonan challenge for generative programming: short position paper
(ACM, 2013)
The appeal of generative programming is "abstraction without guilt": eliminating the vexing trade-off between writing high-level code and highly-performant code. Generative programming also promises to formally capture the ...
Share this page