Sciweavers

8699 search results - page 1684 / 1740
» Elements of the Theory of Computation
Sort
View
BROADNETS
2005
IEEE
15 years 4 months ago
Dual-link failure resiliency through backup link mutual exclusion
— Networks employ link protection to achieve fast recovery from link failures. While the first link failure can be protected using link protection, there are several alternative...
Amit Chandak, Srinivasan Ramasubramanian
94
Voted
ICRA
2005
IEEE
146views Robotics» more  ICRA 2005»
15 years 4 months ago
Probabilistic Gaze Imitation and Saliency Learning in a Robotic Head
— Imitation is a powerful mechanism for transferring knowledge from an instructor to a na¨ıve observer, one that is deeply contingent on a state of shared attention between the...
Aaron P. Shon, David B. Grimes, Chris Baker, Matth...
SSDBM
2005
IEEE
100views Database» more  SSDBM 2005»
15 years 4 months ago
An Information Theoretic Model for Database Alignment
As with many large organizations, the Government's data is split in many different ways and is collected at different times by different people. The resulting massive data he...
Patrick Pantel, Andrew Philpot, Eduard H. Hovy
ACMICEC
2005
ACM
175views ECommerce» more  ACMICEC 2005»
15 years 4 months ago
A theoretic discussion of tourism e-commerce
This paper presents the model of e-market structure and process analysis of tourism e-commerce. First the tourism e-commerce status quo is given clearly; secondly e-commerce and i...
Si-qing Liu
MM
2005
ACM
140views Multimedia» more  MM 2005»
15 years 4 months ago
Web image clustering by consistent utilization of visual features and surrounding texts
Image clustering, an important technology for image processing, has been actively researched for a long period of time. Especially in recent years, with the explosive growth of th...
Bin Gao, Tie-Yan Liu, Tao Qin, Xin Zheng, QianShen...
« Prev « First page 1684 / 1740 Last » Next »