Sciweavers

776 search results - page 130 / 156
» Conceptual Patterns for Reuse in Information Systems Analysi...
Sort
View
89
Voted
MM
2006
ACM
113views Multimedia» more  MM 2006»
15 years 6 months ago
Transductive inference using multiple experts for brushwork annotation in paintings domain
Many recent studies perform annotation of paintings based on brushwork. In these studies the brushwork is modeled indirectly as part of the annotation of high-level artistic conce...
Yelizaveta Marchenko, Tat-Seng Chua, Ramesh Jain
AAAI
2011
14 years 14 days ago
Exploiting Phase Transition in Latent Networks for Clustering
In this paper, we model the pair-wise similarities of a set of documents as a weighted network with a single cutoff parameter. Such a network can be thought of an ensemble of unwe...
Vahed Qazvinian, Dragomir R. Radev
86
Voted
ISI
2004
Springer
15 years 5 months ago
A Tool for Internet Chatroom Surveillance
Internet chatrooms are common means of interaction and communications, and they carry valuable information about formal or ad-hoc formation of groups with diverse objectives. This ...
Seyit Ahmet Çamtepe, Mukkai S. Krishnamoort...
84
Voted
CIT
2006
Springer
15 years 4 months ago
Intelligent Query Tree (IQT) Protocol to Improve RFID Tag Read Efficiency
Radio Frequency Identification (RFID) is slated to become a standard for tagging various products. As more and more products become RFID enabled, fast tag identification mechanism...
Naval Bhandari, Anirudha Sahoo, Sridhar Iyer
SIGSOFT
2007
ACM
16 years 1 months ago
Efficient token based clone detection with flexible tokenization
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
Hamid Abdul Basit, Stan Jarzabek