Sciweavers

21319 search results - page 4061 / 4264
» An Approach for Method Reengineering
Sort
View
NETWORK
2007
167views more  NETWORK 2007»
15 years 4 months ago
Sensor Localization under Limited Measurement Capabilities
If we abstract a sensor network as a network graph consisting of vertices and edges, where vertices represent sensor nodes and edges represent distance measurements between neighbo...
Chen Wang, Li Xiao
PAMI
2007
144views more  PAMI 2007»
15 years 3 months ago
Facial Action Unit Recognition by Exploiting Their Dynamic and Semantic Relationships
—A system that could automatically analyze the facial actions in real time has applications in a wide range of different fields. However, developing such a system is always chall...
Yan Tong, Wenhui Liao, Qiang Ji
PRL
2007
287views more  PRL 2007»
15 years 3 months ago
2D and 3D face recognition: A survey
Government agencies are investing a considerable amount of resources into improving security systems as result of recent terrorist events that dangerously exposed flaws and weakn...
Andrea F. Abate, Michele Nappi, Daniel Riccio, Gab...
PVLDB
2008
82views more  PVLDB 2008»
15 years 3 months ago
Mining non-redundant high order correlations in binary data
Many approaches have been proposed to find correlations in binary data. Usually, these methods focus on pair-wise correlations. In biology applications, it is important to find co...
Xiang Zhang, Feng Pan, Wei Wang 0010, Andrew B. No...
CIKM
2010
Springer
15 years 3 months ago
Exploiting site-level information to improve web search
Ranking Web search results has long evolved beyond simple bag-of-words retrieval models. Modern search engines routinely employ machine learning ranking that relies on exogenous r...
Andrei Z. Broder, Evgeniy Gabrilovich, Vanja Josif...
« Prev « First page 4061 / 4264 Last » Next »