Sciweavers

9572 search results - page 1814 / 1915
» Cover Algorithms and Their Combination
Sort
View
101
Voted
SEMWEB
2009
Springer
15 years 7 months ago
RiMOM Results for OAEI 2009
In this report, we give a brief explanation of how RiMOM obtains the results at OAEI 2009 Campaign, especially in the new Instance Matching track. At first, we show the basic alig...
Xiao Zhang, Qian Zhong, Feng Shi, Juanzi Li, Jie T...
ISSTA
2009
ACM
15 years 7 months ago
Exception analysis and points-to analysis: better together
Exception analysis and points-to analysis are typically done in complete separation. Past algorithms for precise exception analysis (e.g., pairing throw clauses with catch stateme...
Martin Bravenboer, Yannis Smaragdakis
111
Voted
MM
2009
ACM
157views Multimedia» more  MM 2009»
15 years 7 months ago
Face image modeling by multilinear subspace analysis with missing values
The main difficulty in face image modeling is to decompose those semantic factors contributing to the formation of the face images, such as identity, illumination and pose. One p...
Xin Geng, Kate Smith-Miles, Zhi-Hua Zhou, Liang Wa...
107
Voted
MOBICOM
2009
ACM
15 years 7 months ago
SurroundSense: mobile phone localization via ambience fingerprinting
A growing number of mobile computing applications are centered around the user’s location. The notion of location is broad, ranging from physical coordinates (latitude/longitude...
Martin Azizyan, Ionut Constandache, Romit Roy Chou...
140
Voted
MOBICOM
2009
ACM
15 years 7 months ago
Frequency-aware rate adaptation and MAC protocols
There has been burgeoning interest in wireless technologies that can use wider frequency spectrum. Technology advances, such as 802.11n and ultra-wideband (UWB), are pushing towar...
Hariharan Rahul, Farinaz Edalat, Dina Katabi, Char...
« Prev « First page 1814 / 1915 Last » Next »