Sciweavers

464 search results - page 24 / 93
» Authorisation Using Attributes from Multiple Authorities
Sort
View
PAMI
2007
196views more  PAMI 2007»
14 years 9 months ago
Bayesian Analysis of Lidar Signals with Multiple Returns
—Time-Correlated Single Photon Counting and Burst Illumination Laser data can be used for range profiling and target classification. In general, the problem is to analyze the res...
Sergio Hernandez-Marin, Andrew M. Wallace, Gavin J...
IUI
2010
ACM
15 years 4 months ago
From documents to tasks: deriving user tasks from document usage patterns
A typical knowledge worker is involved in multiple tasks and switches frequently between them every work day. These frequent switches become expensive because each task switch req...
Oliver Brdiczka
WSC
1997
14 years 11 months ago
Collision Awareness Multiple Access Networks Performance Optimization
Collision awareness (CA) multiple access networks include the carrier sense multiple access (CSMA), ALOHA, and Ethernet networks. In order to maximize throughput with minimum netw...
Paul T. R. Wang, Yoon K. Hong
ECIR
2007
Springer
14 years 11 months ago
Entropy-Based Authorship Search in Large Document Collections
The purpose of authorship search is to identify documents written by a particular author or in a particular style in large document collections. Standard search engines match docum...
Ying Zhao, Justin Zobel
JCDL
2010
ACM
163views Education» more  JCDL 2010»
15 years 2 months ago
Flexible access to photo libraries via time, place, tags, and visual features
Photo libraries are growing in quantity and size, requiring better support for locating desired photographs. MediaGLOW is an interactive visual workspace designed to address this ...
Andreas Girgensohn, Frank Shipman, Thea Turner, Ly...