Sciweavers

60 search results - page 12 / 12
» FlexPref: A Framework for Extensible Preference Evaluation i...
Sort
View
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
13 years 11 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
WIDM
2004
ACM
13 years 10 months ago
XPath lookup queries in P2P networks
We address the problem of querying XML data over a P2P network. In P2P networks, the allowed kinds of queries are usually exact-match queries over file names. We discuss the exte...
Angela Bonifati, Ugo Matrangolo, Alfredo Cuzzocrea...
PR
2006
117views more  PR 2006»
13 years 5 months ago
On transforming statistical models for non-frontal face verification
: We address the pose mismatch problem which can occur in face verification systems that have only a single (frontal) face image available for training. In the framework of a Bayes...
Conrad Sanderson, Samy Bengio, Yongsheng Gao
JCDL
2004
ACM
125views Education» more  JCDL 2004»
13 years 10 months ago
Generating fuzzy semantic metadata describing spatial relations from images using the R-histogram
Automatic generation of semantic metadata describing spatial relations is highly desirable for image digital libraries. Relative spatial relations between objects in an image conv...
Yuhang Wang, Fillia Makedon, James Ford, Li Shen, ...
BTW
2003
Springer
103views Database» more  BTW 2003»
13 years 10 months ago
XPath-Aware Chunking of XML-Documents
Dissemination systems are used to route information received from many publishers individually to multiple subscribers. The core of a dissemination system consists of an efficient...
Wolfgang Lehner, Florian Irmert