Sciweavers

2061 search results - page 367 / 413
» Authorization for Metacomputing Applications
Sort
View
108
Voted
SIGIR
2006
ACM
15 years 6 months ago
Identifying comparative sentences in text documents
This paper studies the problem of identifying comparative sentences in text documents. The problem is related to but quite different from sentiment/opinion sentence identification...
Nitin Jindal, Bing Liu
110
Voted
WIKIS
2006
ACM
15 years 6 months ago
SweetWiki: semantic web enabled technologies in Wiki
Wikis are social web sites enabling a potentially large number of participants to modify any page or create a new page using their web browser. As they grow, wikis may suffer from...
Michel Buffa, Fabien Gandon
80
Voted
WOWMOM
2006
ACM
110views Multimedia» more  WOWMOM 2006»
15 years 6 months ago
Entrapping Adversaries for Source Protection in Sensor Networks
Sensor networks are used in a variety of application areas for diverse problems from habitat monitoring to military tracking. Whenever they are used to monitor sensitive objects, ...
Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford, ...
101
Voted
AMFG
2005
IEEE
146views Biometrics» more  AMFG 2005»
15 years 6 months ago
A Practical Face Relighting Method for Directional Lighting Normalization
We propose a simplified and practical computational technique for estimating directional lighting in uncalibrated images of faces in frontal pose. We show that this inverse probl...
Kuang-Chih Lee, Baback Moghaddam
CODES
2005
IEEE
15 years 6 months ago
Comparing two testbench methods for hierarchical functional verification of a bluetooth baseband adaptor
The continuous improvement on the design methodologies and processes has made possible the creation of huge and very complex digital systems. Design verification is one of the mai...
Edgar L. Romero, Marius Strum, Wang Jiang Chau