Sciweavers

26496 search results - page 5207 / 5300
» An Approach to Computing Ethics
Sort
View
CODES
2006
IEEE
14 years 11 months ago
Architectural support for safe software execution on embedded processors
The lack of memory safety in many popular programming languages, including C and C++, has been a cause for great concern in the realm of software reliability, verification, and mo...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
CIVR
2008
Springer
222views Image Analysis» more  CIVR 2008»
14 years 11 months ago
Automatic image annotation via local multi-label classification
As the consequence of semantic gap, visual similarity does not guarantee semantic similarity, which in general is conflicting with the inherent assumption of many generativebased ...
Mei Wang, Xiangdong Zhou, Tat-Seng Chua
CLEF
2008
Springer
14 years 11 months ago
UJM at ImageCLEFwiki 2008
This paper reports our multimedia information retrieval experiments carried out for the ImageCLEF track (ImageCLEFwiki). The task is to answer to user information needs, i.e. quer...
Christophe Moulin, Cécile Barat, Mathias G&...
COLT
2008
Springer
14 years 11 months ago
Adapting to a Changing Environment: the Brownian Restless Bandits
In the multi-armed bandit (MAB) problem there are k distributions associated with the rewards of playing each of k strategies (slot machine arms). The reward distributions are ini...
Aleksandrs Slivkins, Eli Upfal
ECAI
2008
Springer
14 years 11 months ago
Using Natural Language Generation Technology to Improve Information Flows in Intensive Care Units
In the drive to improve patient safety, patients in modern intensive care units are closely monitored with the generation of very large volumes of data. Unless the data are further...
Jim Hunter, Albert Gatt, François Portet, E...
« Prev « First page 5207 / 5300 Last » Next »