Sciweavers

20778 search results - page 3778 / 4156
» Algorithms for Data Migration
Sort
View
159
Voted
PC
2006
103views Management» more  PC 2006»
15 years 4 months ago
Parallel skeletons for manipulating general trees
Trees are important datatypes that are often used in representing structured data such as XML. Though trees are widely used in sequential programming, it is hard to write efficien...
Kiminori Matsuzaki, Zhenjiang Hu, Masato Takeichi
162
Voted
IJCV
2007
189views more  IJCV 2007»
15 years 4 months ago
Prior-based Segmentation and Shape Registration in the Presence of Perspective Distortion
Challenging object detection and segmentation tasks can be facilitated by the availability of a reference object. However, accounting for possible transformations between the diff...
Tammy Riklin-Raviv, Nahum Kiryati, Nir A. Sochen
158
Voted
IJCV
2007
146views more  IJCV 2007»
15 years 4 months ago
Image-Based Modeling by Joint Segmentation
The paper first traces the image-based modeling back to feature tracking and factorization that have been developed in the group led by Kanade since the eighties. Both feature tra...
Long Quan, Jingdong Wang, Ping Tan, Lu Yuan
SIGMOD
2008
ACM
100views Database» more  SIGMOD 2008»
15 years 4 months ago
Incorporating string transformations in record matching
Today's record matching infrastructure does not allow a flexible way to account for synonyms such as "Robert" and "Bob" which refer to the same name, and ...
Arvind Arasu, Surajit Chaudhuri, Kris Ganjam, Ragh...
IJNSEC
2007
194views more  IJNSEC 2007»
15 years 4 months ago
Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences
The exponential growth of the Internet (WWW in particular) has opened-up several avenues for covert channel communication. Steganographic communication is one such avenue. Hiding ...
Ashish Patel, M. Shah, Rajarathnam Chandramouli, K...
« Prev « First page 3778 / 4156 Last » Next »