Sciweavers

133 search results - page 13 / 27
» Just-in-time Data Integration in Action
Sort
View
85
Voted
VLDB
2004
ACM
111views Database» more  VLDB 2004»
15 years 2 months ago
Technology Challenges in a Data Warehouse
This presentation will discuss several database technology challenges that are faced when building a data warehouse. It will touch on the challenges posed by high capacity drives ...
Ramesh Bhashyam
HICSS
2007
IEEE
105views Biometrics» more  HICSS 2007»
15 years 3 months ago
Leveraging Social Networks To Motivate Individuals to Reduce their Ecological Footprints
What role can social networking websites play in supporting large-scale group action and change? We are proposing to explore their use in supporting individual reduction in person...
Jennifer Mankoff, Deanna Matthews, Susan R. Fussel...
ECCV
2004
Springer
15 years 11 months ago
Decision Theoretic Modeling of Human Facial Displays
We present a vision based, adaptive, decision theoretic model of human facial displays in interactions. The model is a partially observable Markov decision process, or POMDP. A POM...
Jesse Hoey, James J. Little
CSL
2002
Springer
14 years 9 months ago
Learning visually grounded words and syntax for a scene description task
A spoken language generation system has been developed that learns to describe objects in computer-generated visual scenes. The system is trained by a `show-and-tell' procedu...
Deb K. Roy
IJNSEC
2011
232views more  IJNSEC 2011»
14 years 4 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou