Sciweavers

16070 search results - page 246 / 3214
» Identifying
Sort
View
JSW
2008
167views more  JSW 2008»
15 years 5 months ago
An Approach to Discover Dependencies between Service Operations
Service composition is emerging as an important paradigm for constructing distributed applications by combining and reusing independently developed component services. One key issu...
Shuying Yan, Jing Wang 0002, Chen Liu, Lei Liu
165
Voted
MMS
2008
15 years 5 months ago
Canonical processes of semantically annotated media production
While many multimedia systems allow the association of semantic annotations with media assets, there is no agreedupon way of sharing these among systems. As an initial step within...
Lynda Hardman, Zeljko Obrenovic, Frank Nack, Brigi...
KAIS
2006
77views more  KAIS 2006»
15 years 5 months ago
Finding centric local outliers in categorical/numerical spaces
Outlier detection techniques are widely used in many applications such as credit card fraud detection, monitoring criminal activities in electronic commerce, etc. These application...
Jeffrey Xu Yu, Weining Qian, Hongjun Lu, Aoying Zh...
FCSC
2007
108views more  FCSC 2007»
15 years 5 months ago
Offline Chinese handwriting recognition: an assessment of current technology
Offline Chinese handwriting recognition (OCHR) is a typically difficult pattern recognition problem. Many authors have presented various approaches to recognizing its different asp...
Sargur N. Srihari, Xuanshen Yang, Gregory R. Ball
IJCSS
2007
119views more  IJCSS 2007»
15 years 5 months ago
Trust in Electronic Markets - Customers' Perspective
People have trusted in face-to-face interaction more than any other modes of interactions to develop relationships and as a result of which one of the most concerned problem that ...
Shweta Sharma, Deepali Singh, D. P. Agrawal