Sciweavers

5934 search results - page 1162 / 1187
» Detecting a Network Failure
Sort
View
ICCV
2007
IEEE
16 years 1 months ago
A Scalable Approach to Activity Recognition based on Object Use
We propose an approach to activity recognition based on detecting and analyzing the sequence of objects that are being manipulated by the user. In domains such as cooking, where m...
Jianxin Wu, Adebola Osuntogun, Tanzeem Choudhury, ...
ICIP
2003
IEEE
16 years 1 months ago
Spline-based boundary loss concealment
Object-based video coding requires the transmission of the object shape. This shape is sent as a binary a-plane. In lossy packetbased networks, such as the Internet, this informat...
Guido M. Schuster, Xiaohuan Li, Aggelos K. Katsagg...
ICDE
2006
IEEE
193views Database» more  ICDE 2006»
16 years 22 days ago
Probabilistic Message Passing in Peer Data Management Systems
Until recently, most data integration techniques involved central components, e.g., global schemas, to enable transparent access to heterogeneous databases. Today, however, with t...
Philippe Cudré-Mauroux, Karl Aberer, Andras...
WWW
2004
ACM
16 years 1 days ago
Anti-aliasing on the web
It is increasingly common for users to interact with the web using a number of different aliases. This trend is a doubleedged sword. On one hand, it is a fundamental building bloc...
Jasmine Novak, Prabhakar Raghavan, Andrew Tomkins
WWW
2004
ACM
16 years 1 days ago
Is question answering an acquired skill?
We present a question answering (QA) system which learns how to detect and rank answer passages by analyzing questions and their answers (QA pairs) provided as training data. We b...
Ganesh Ramakrishnan, Soumen Chakrabarti, Deepa Par...
« Prev « First page 1162 / 1187 Last » Next »