-
2
-
-
84880240041
-
Searching the web
-
A. Arasu, J. Cho, H. Garcia-Molina, A. Paepcke, and S. Raghavan. Searching the web. ACM Transactions on Internet Technology, 1(1):2-43, 2001.
-
(2001)
ACM Transactions on Internet Technology
, vol.1
, Issue.1
, pp. 2-43
-
-
Arasu, A.1
Cho, J.2
Garcia-Molina, H.3
Paepcke, A.4
Raghavan, S.5
-
3
-
-
70349130748
-
Assignment problem in content distribution networks: Unsplittable hard-capacitated facility location
-
Society for Industrial and Applied Mathematics Philadelphia, PA, USA
-
M. Bateni and M. Hajiaghayi. Assignment problem in content distribution networks: Unsplittable hard-capacitated facility location. In Proceedings of the Nineteenth Annual ACM-SIAM Symposium on Discrete Algorithms, pages 805-814. Society for Industrial and Applied Mathematics Philadelphia, PA, USA, 2009.
-
(2009)
Proceedings of the Nineteenth Annual ACM-SIAM Symposium on Discrete Algorithms
, pp. 805-814
-
-
Bateni, M.1
Hajiaghayi, M.2
-
4
-
-
4544259509
-
Locality-sensitive hashing scheme based on p-stable distributions
-
ACM New York, NY, USA
-
M. Datar, N. Immorlica, P. Indyk, and V. Mirrokni. Locality-sensitive hashing scheme based on p-stable distributions. In Proceedings of the twentieth Annual Symposium on Computational Geometry, pages 253-262. ACM New York, NY, USA, 2004.
-
(2004)
Proceedings of the twentieth Annual Symposium on Computational Geometry
, pp. 253-262
-
-
Datar, M.1
Immorlica, N.2
Indyk, P.3
Mirrokni, V.4
-
5
-
-
48149108415
-
-
M. El'arbi, C. Ben Amar, and H. Nicolas. A video watermarking scheme resistant to geometric transformations. In Image Processing. IEEE International Conference on, pages V -481-V -484, 2007.
-
M. El'arbi, C. Ben Amar, and H. Nicolas. A video watermarking scheme resistant to geometric transformations. In Image Processing. IEEE International Conference on, pages V -481-V -484, 2007.
-
-
-
-
7
-
-
33644995185
-
Analysis and design of secure watermark-based authentication systems
-
C. Fei, D. Kundur, and R. Kwong. Analysis and design of secure watermark-based authentication systems. IEEE Transactions on Information Forensics and Security, 1(1):43-55, 2006.
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.1
, pp. 43-55
-
-
Fei, C.1
Kundur, D.2
Kwong, R.3
-
11
-
-
27744503899
-
E.cient texture analysis of sar imagery
-
U. Kandaswamy, D. Adjeroh, and M. Lee. E.cient texture analysis of sar imagery. IEEE Transactions on Geoscience and Remote Sensing, 43(9):2075-2083, 2005.
-
(2005)
IEEE Transactions on Geoscience and Remote Sensing
, vol.43
, Issue.9
, pp. 2075-2083
-
-
Kandaswamy, U.1
Adjeroh, D.2
Lee, M.3
-
12
-
-
0035254386
-
Performance evaluation of redirection schemes in content distribution networks
-
J. Kangasharju, K. Ross, and J. Roberts. Performance evaluation of redirection schemes in content distribution networks. Computer Communications, 24(2):207-214, 2001.
-
(2001)
Computer Communications
, vol.24
, Issue.2
, pp. 207-214
-
-
Kangasharju, J.1
Ross, K.2
Roberts, J.3
-
15
-
-
0032656674
-
Comparison of automatic shot boundary detection algorithms
-
R. Lienhart. Comparison of automatic shot boundary detection algorithms. In Proc. SPIE, pages 290-301, 1999.
-
(1999)
Proc. SPIE
, pp. 290-301
-
-
Lienhart, R.1
-
16
-
-
33847204918
-
Computer forensics: The need for standardization and certification
-
M. Meyers and M. Rogers. Computer forensics: the need for standardization and certification. International Journal of Digital Evidence, 3(2):2002, 2004.
-
(2004)
International Journal of Digital Evidence
, vol.3
, Issue.2
, pp. 2002
-
-
Meyers, M.1
Rogers, M.2
-
17
-
-
33745196858
-
Insight and perspectives for content delivery networks
-
G. Pallis and A. Vakali. Insight and perspectives for content delivery networks. Communications of the ACM, 49(1):101-106, 2006.
-
(2006)
Communications of the ACM
, vol.49
, Issue.1
, pp. 101-106
-
-
Pallis, G.1
Vakali, A.2
-
21
-
-
0035337611
-
An evaluation of color-spatial retrieval techniques for large image databases
-
K. Tan, B. Ooi, and C. Yee. An evaluation of color-spatial retrieval techniques for large image databases. Multimedia Tools and Applications, 14(1):55-78, 2001.
-
(2001)
Multimedia Tools and Applications
, vol.14
, Issue.1
, pp. 55-78
-
-
Tan, K.1
Ooi, B.2
Yee, C.3
-
22
-
-
33750927408
-
Exposing digital forgeries in video by detecting double mpeg compression
-
ACM New York, NY, USA
-
W. Wang and H. Farid. Exposing digital forgeries in video by detecting double mpeg compression. In Proceedings of the 8th Workshop on Multimedia and Security, pages 37-47. ACM New York, NY, USA, 2006.
-
(2006)
Proceedings of the 8th Workshop on Multimedia and Security
, pp. 37-47
-
-
Wang, W.1
Farid, H.2
-
24
-
-
38849195462
-
Exposing digital forgeries in video by detecting duplication
-
ACM New York, NY, USA
-
W. Wang and H. Farid. Exposing digital forgeries in video by detecting duplication. In Proceedings of the 9th Workshop on Multimedia & Security, pages 35-42. ACM New York, NY, USA, 2007.
-
(2007)
Proceedings of the 9th Workshop on Multimedia & Security
, pp. 35-42
-
-
Wang, W.1
Farid, H.2
-
26
-
-
0031109287
-
An integrated system for content-based video retrieval and browsing
-
H. Zhang, J. Wu, D. Zhong, and S. Smoliar. An integrated system for content-based video retrieval and browsing. Pattern recognition, 30(4):643-658, 1997.
-
(1997)
Pattern recognition
, vol.30
, Issue.4
, pp. 643-658
-
-
Zhang, H.1
Wu, J.2
Zhong, D.3
Smoliar, S.4
-
28
-
-
33747729581
-
at. Inverted files for text search engines
-
J. Zobel and A. Mo.at. Inverted files for text search engines. ACM Computing Surveys, 38(2), 2006.
-
(2006)
ACM Computing Surveys
, vol.38
, Issue.2
-
-
Zobel, J.1
Mo, A.2
|