Sciweavers

633 search results - page 77 / 127
» A Classified and Comparative Study of Edge Detection Algorit...
Sort
View
159
Voted
CIKM
2005
Springer
15 years 10 months ago
Detecting changes on unordered XML documents using relational databases: a schema-conscious approach
Several relational approaches have been proposed to detect the changes to XML documents by using relational databases. These approaches store the XML documents in the relational d...
Erwin Leonardi, Sourav S. Bhowmick
ECCV
2004
Springer
16 years 6 months ago
Evaluation of Robust Fitting Based Detection
Low-level image processing algorithms generally provide noisy features that are far from being Gaussian. Medium-level tasks such as object detection must therefore be robust to out...
Sio-Song Ieng, Jean-Philippe Tarel, Pierre Charbon...
WORM
2004
15 years 6 months ago
ACT: attachment chain tracing scheme for email virus detection and control
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the soci...
Jintao Xiong
134
Voted
VTC
2008
IEEE
142views Communications» more  VTC 2008»
15 years 11 months ago
Adaptive Token Bank Fair Queuing Scheduling in the Downlink of 4G Wireless Multicarrier Networks
—In this paper we present an efficient cross-layer scheduling algorithm designed for resource allocation in downlink of 4G wireless multicarrier networks. This study focuses on ...
Feroz A. Bokhari, William K. Wong, Halim Yanikomer...
129
Voted
SIGIR
2008
ACM
15 years 4 months ago
Local text reuse detection
Text reuse occurs in many different types of documents and for many different reasons. One form of reuse, duplicate or near-duplicate documents, has been a focus of researchers be...
Jangwon Seo, W. Bruce Croft