Sciweavers

325 search results - page 36 / 65
» Analysis of the constraint proposal method for two-party neg...
Sort
View
133
Voted
KDD
2010
ACM
245views Data Mining» more  KDD 2010»
15 years 3 months ago
Flexible constrained spectral clustering
Constrained clustering has been well-studied for algorithms like K-means and hierarchical agglomerative clustering. However, how to encode constraints into spectral clustering rem...
Xiang Wang, Ian Davidson
ADC
2009
Springer
122views Database» more  ADC 2009»
15 years 7 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...
ICDAR
2011
IEEE
14 years 2 days ago
Edge-Based Features for Localization of Artificial Urdu Text in Video Images
—Content-based video indexing and retrieval has become an interesting research area with the tremendous growth in the amount of digital media. In addition to the audio-visual con...
Akhtar Jamil, Imran Siddiqi, Fahim Arif, Ahsen Raz...
WOWMOM
2005
ACM
115views Multimedia» more  WOWMOM 2005»
15 years 6 months ago
Precise Distributed Localization Algorithms for Wireless Networks
We propose in this paper reliable and precise distributed localization algorithms for wireless networks: iterative multidimensional scaling (IT-MDS) and simulated annealing multid...
Saad Biaz, Yiming Ji
95
Voted
AIMS
2007
Springer
15 years 6 months ago
Harnessing Models for Policy Conflict Analysis
Policy conflict analysis processes based solely on the examination of policy language constructs can not readily discern the semantics associated with the managed system for which ...
Steven Davy, Brendan Jennings