Sciweavers

2797 search results - page 309 / 560
» Code query by example
Sort
View
SACMAT
2004
ACM
15 years 9 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
MIG
2009
Springer
15 years 8 months ago
Data Driven Evaluation of Crowds
There are various techniques for simulating crowds, however, in most cases the quality of the simulation is measured by examining its “look-and-feel”. Even if the aggregate mov...
Alon Lerner, Yiorgos Chrysanthou, Ariel Shamir, Da...
SEMWEB
2001
Springer
15 years 8 months ago
Utilizing Host-Formalisms to Extend RDF-Semantics
Abstract. RDF may be considered as an application of XML intended to interoperably exchange semantics between Web applications. In its current form, this objective may be hard to r...
Wolfram Conen, Reinhold Klapsing
ICMCS
2000
IEEE
170views Multimedia» more  ICMCS 2000»
15 years 8 months ago
Update Relevant Image Weights for Content-Based Image Retrieval using Support Vector Machines
Relevance feedback [1] has been a powerful tool for interactive Content-Based Image Retrieval (CBIR). During the retrieval process, the user selects the most relevant images and p...
Qi Tian, Pengyu Hong, Thomas S. Huang
DL
2000
Springer
162views Digital Library» more  DL 2000»
15 years 8 months ago
Snowball: extracting relations from large plain-text collections
Text documents often contain valuable structured data that is hidden in regular English sentences. This data is best exploited if available as a relational table that we could use...
Eugene Agichtein, Luis Gravano