Sciweavers

2701 search results - page 451 / 541
» Evaluation Issues
Sort
View
TPDS
2010
256views more  TPDS 2010»
15 years 3 months ago
Privacy-Conscious Location-Based Queries in Mobile Environments
— In location-based services, users with location-aware mobile devices are able to make queries about their surroundings anywhere and at any time. While this ubiquitous computing...
Jianliang Xu, Xueyan Tang, Haibo Hu, Jing Du
155
Voted
VSTTE
2010
Springer
15 years 2 months ago
Dafny Meets the Verification Benchmarks Challenge
A suite of verification benchmarks for software verification tools and techniques, presented at VSTTE 2008 [11], provides an initial catalogue of benchmark challenges for the Verif...
K. Rustan M. Leino, Rosemary Monahan
160
Voted
CVPR
2011
IEEE
15 years 10 days ago
Unbiased Look at Dataset Bias
Datasets are an integral part of contemporary object recognition research. They have been the chief reason for the considerable progress in the field, not just as source of large...
Antonio Torralba, Alyosha Efros
JNCA
2011
137views more  JNCA 2011»
14 years 12 months ago
Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks
Built upon a shared wireless medium, wireless mesh network is particularly vulnerable to jamming attacks. The ability to recover from attacks and maintain an acceptable level of s...
Shanshan Jiang, Yuan Xue

Publication
352views
14 years 10 months ago
A Contourlet Transform Feature Extraction Scheme for Ultrasound Thyroid Texture Classification
Ultrasonography is an invaluable and widely used medical imaging tool. Nevertheless, automatic texture analysis on ultrasound images remains a challenging issue. This work presen...
Stamos Katsigiannis, Eystratios G. Keramidas, Dimi...