Sciweavers

1420 search results - page 224 / 284
» Cluster Ensemble Selection
Sort
View
83
Voted
MM
2003
ACM
116views Multimedia» more  MM 2003»
15 years 5 months ago
Photo2Video
To exploit rich content embedded in a single photograph, a system named Photo2Video was developed to automatically convert a photographic series into a video by simulating camera ...
Xian-Sheng Hua, Lie Lu, HongJiang Zhang
101
Voted
IH
2001
Springer
15 years 5 months ago
Computational Forensic Techniques for Intellectual Property Protection
Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, t...
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonja...
119
Voted
ICPPW
2000
IEEE
15 years 5 months ago
Challenges in URL Switching for Implementing Globally Distributed Web Sites
URL, or layer-5, switches can be used to implement locally and globally distributed web sites. URL switches must be able to exploit knowledge of server load and content (e.g., of ...
Zornitza Genova, Kenneth J. Christensen
EWCBR
2000
Springer
15 years 4 months ago
Maintaining Case-Based Reasoning Systems Using Fuzzy Decision Trees
This paper proposes a methodology of maintaining Case Based Reasoning (CBR) systems by using fuzzy decision tree induction - a machine learning technique. The methodology is mainly...
Simon C. K. Shiu, Cai Hung Sun, Xizhao Wang, Danie...
111
Voted
PACS
2000
Springer
99views Hardware» more  PACS 2000»
15 years 4 months ago
Dynamically Reconfiguring Processor Resources to Reduce Power Consumption in High-Performance Processors
Power dissipation is a major concern not only for portable systems, but also for high-performance systems. In the past, energy consumption and processor heating was reduced mainly...
Roberto Maro, Yu Bai, R. Iris Bahar