Sciweavers

10907 search results - page 2032 / 2182
» Constraint Based Strategies
Sort
View
MIR
2010
ACM
232views Multimedia» more  MIR 2010»
15 years 4 months ago
Exploiting external knowledge to improve video retrieval
Most video retrieval systems are multimodal, commonly relying on textual information, low- and high-level semantic features extracted from query visual examples. In this work, we ...
David Vallet, Iván Cantador, Joemon M. Jose
HYBRID
2010
Springer
15 years 4 months ago
Compositional analysis for linear control systems
The complexity of physical and engineering systems, both in terms of the governing physical phenomena and the number of subprocesses involved, is mirrored in ever more complex mat...
Florian Kerber, Arjan van der Schaft
WEA
2010
Springer
284views Algorithms» more  WEA 2010»
15 years 4 months ago
Paging Multiple Users in Cellular Network: Yellow Page and Conference Call Problems
Abstract. Mobile users are roaming in a zone of cells in a cellular network system. The probabilities of each user residing in each cell are known, and all probabilities are indepe...
Amotz Bar-Noy, Panagiotis Cheilaris, Yi Feng 0002
AINA
2009
IEEE
15 years 4 months ago
JPEG Steganography: A Performance Evaluation of Quantization Tables
The two most important aspects of any imagebased steganographic system are the imperceptibility and the capacity of the stego image. This paper evaluates the performance and effic...
Adel Almohammad, Gheorghita Ghinea, Robert M. Hier...
DASFAA
2009
IEEE
252views Database» more  DASFAA 2009»
15 years 4 months ago
Optimal Privacy-Aware Path in Hippocratic Databases
Abstract. Privacy becomes a major concern for both customers and enterprises in today’s corporate marketing strategies, many research efforts have been put into developing new p...
Min Li, Xiaoxun Sun, Hua Wang, Yanchun Zhang
« Prev « First page 2032 / 2182 Last » Next »