Sciweavers

1761 search results - page 351 / 353
» Performance Evaluation : = (Process Algebra Model Checking...
Sort
View
JEI
2007
102views more  JEI 2007»
13 years 5 months ago
Testing tone mapping operators with human-perceived reality
Abstract. A number of successful tone mapping operators for contrast compression have been proposed due to the need to visualize high dynamic range (HDR) images on low dynamic rang...
Akiko Yoshida, Volker Blanz, Karol Myszkowski, Han...
TPDS
2008
116views more  TPDS 2008»
13 years 5 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
SIGIR
2002
ACM
13 years 5 months ago
Empirical studies in strategies for Arabic retrieval
This work evaluates a few search strategies for Arabic monolingual and cross-lingual retrieval, using the TREC Arabic corpus as the test-bed. The release by NIST in 2001 of an Ara...
Jinxi Xu, Alexander Fraser, Ralph M. Weischedel
JAIR
2010
142views more  JAIR 2010»
13 years 4 months ago
Context-based Word Acquisition for Situated Dialogue in a Virtual World
To tackle the vocabulary problem in conversational systems, previous work has applied unsupervised learning approaches on co-occurring speech and eye gaze during interaction to au...
Shaolin Qu, Joyce Yue Chai
SIGSOFT
2010
ACM
13 years 3 months ago
The missing links: bugs and bug-fix commits
Empirical studies of software defects rely on links between bug databases and program code repositories. This linkage is typically based on bug-fixes identified in developer-enter...
Adrian Bachmann, Christian Bird, Foyzur Rahman, Pr...