Sciweavers

2250 search results - page 442 / 450
» Authorizing applications in singularity
Sort
View
MVA
2011
336views Computer Vision» more  MVA 2011»
14 years 4 months ago
In-vehicle camera traffic sign detection and recognition
: In this paper we discuss theoretical foundations and a practical realization of a real-time traffic sign detection, tracking and recognition system operating on board of a vehicl...
Andrzej Ruta, Fatih Porikli, Shintaro Watanabe, Yo...
IHI
2010
197views Healthcare» more  IHI 2010»
14 years 4 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...
89
Voted
INTERSPEECH
2010
14 years 4 months ago
Vocabulary independent spoken query: a case for subword units
In this work, we describe a subword unit approach for information retrieval of items by voice. An algorithm based on the minimum description length (MDL) principle converts an ind...
Evandro B. Gouvêa, Tony Ezzat
PE
2010
Springer
212views Optimization» more  PE 2010»
14 years 4 months ago
Modeling TCP throughput: An elaborated large-deviations-based model and its empirical validation
In today's Internet, a large part of the traffic is carried using the TCP transport protocol. Characterization of the variations of TCP traffic is thus a major challenge, bot...
Patrick Loiseau, Paulo Gonçalves, Julien Ba...
SIGMOD
2010
ACM
362views Database» more  SIGMOD 2010»
14 years 4 months ago
Data warehousing and analytics infrastructure at facebook
Scalable analysis on large data sets has been core to the functions of a number of teams at Facebook - both engineering and nonengineering. Apart from ad hoc analysis of data and ...
Ashish Thusoo, Zheng Shao, Suresh Anthony, Dhruba ...