Sciweavers

12697 search results - page 2278 / 2540
» Call for Papers
Sort
View
CIVR
2009
Springer
145views Image Analysis» more  CIVR 2009»
15 years 7 months ago
Jointly optimising relevance and diversity in image retrieval
In this paper we present a method to jointly optimise the relevance and the diversity of the results in image retrieval. Without considering diversity, image retrieval systems oft...
Thomas Deselaers, Tobias Gass, Philippe Dreuw, Her...
150
Voted
CLOUDCOM
2009
Springer
15 years 7 months ago
Cloudbus Toolkit for Market-Oriented Cloud Computing
This keynote paper: (1) presents the 21st century vision of computing and identifies various IT paradigms promising to deliver computing as a utility; (2) defines the architecture ...
Rajkumar Buyya, Suraj Pandey, Christian Vecchiola
COCO
2009
Springer
155views Algorithms» more  COCO 2009»
15 years 7 months ago
Weak Derandomization of Weak Algorithms: Explicit Versions of Yao's Lemma
—A simple averaging argument shows that given a randomized algorithm A and a function f such that for every input x, Pr[A(x) = f(x)] ≥ 1−ρ (where the probability is over the...
Ronen Shaltiel
DFG
2009
Springer
15 years 7 months ago
Group-Level Analysis and Visualization of Social Networks
Social network analysis investigates the structure of relations amongst social actors. A general approach to detect patterns of interaction and to filter out irregularities is to ...
Michael Baur, Ulrik Brandes, Jürgen Lerner, D...
EFORENSICS
2009
Springer
15 years 7 months ago
Vocal Forgery in Forensic Sciences
Abstract. This article describes techniques of vocal forgery able to affect automatic speaker recognition system in a forensic context. Vocal forgery covers two main aspects: voice...
Patrick Perrot, Mathieu Morel, Joseph Razik, G&eac...
« Prev « First page 2278 / 2540 Last » Next »