Sciweavers

487 search results - page 50 / 98
» Detecting Link Spam Using Temporal Information
Sort
View
COMPLEXITY
2007
116views more  COMPLEXITY 2007»
15 years 3 months ago
Life, information, entropy, and time: Vehicles for semantic inheritance
abstractions provides an additional supra-phenotypic vehicle for semantic inheritance, which supports the cultural heritages around which civilizations revolve. The following three...
Antony R. Crofts
NSPW
2006
ACM
15 years 9 months ago
E-Prime for security: a new security paradigm
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
Steven J. Greenwald
MMM
2005
Springer
167views Multimedia» more  MMM 2005»
15 years 9 months ago
A Framework for Sub-Window Shot Detection
Browsing a digital video library can be very tedious especially with an ever expanding collection of multimedia material. We present a novel framework for extracting sub-window sh...
Chuohao Yeo, Yongwei Zhu, Qibin Sun, Shih-Fu Chang
157
Voted
JCDL
2010
ACM
259views Education» more  JCDL 2010»
15 years 8 months ago
Exploiting time-based synonyms in searching document archives
Query expansion of named entities can be employed in order to increase the retrieval effectiveness. A peculiarity of named entities compared to other vocabulary terms is that they...
Nattiya Kanhabua, Kjetil Nørvåg
142
Voted
CVPR
2009
IEEE
16 years 23 days ago
Motion pattern interpretation and detection for tracking moving vehicles in airborne video
Detection and tracking of moving vehicles in airborne videos is a challenging problem. Many approaches have been proposed to improve motion segmentation on frameby-frame and pixel...
Gérard G. Medioni, Qian Yu