Sciweavers

133 search results - page 13 / 27
» Just-in-time Data Integration in Action
Sort
View
VLDB
2004
ACM
111views Database» more  VLDB 2004»
15 years 5 months ago
Technology Challenges in a Data Warehouse
This presentation will discuss several database technology challenges that are faced when building a data warehouse. It will touch on the challenges posed by high capacity drives ...
Ramesh Bhashyam
HICSS
2007
IEEE
105views Biometrics» more  HICSS 2007»
15 years 6 months ago
Leveraging Social Networks To Motivate Individuals to Reduce their Ecological Footprints
What role can social networking websites play in supporting large-scale group action and change? We are proposing to explore their use in supporting individual reduction in person...
Jennifer Mankoff, Deanna Matthews, Susan R. Fussel...
ECCV
2004
Springer
16 years 1 months ago
Decision Theoretic Modeling of Human Facial Displays
We present a vision based, adaptive, decision theoretic model of human facial displays in interactions. The model is a partially observable Markov decision process, or POMDP. A POM...
Jesse Hoey, James J. Little
CSL
2002
Springer
14 years 11 months ago
Learning visually grounded words and syntax for a scene description task
A spoken language generation system has been developed that learns to describe objects in computer-generated visual scenes. The system is trained by a `show-and-tell' procedu...
Deb K. Roy
IJNSEC
2011
232views more  IJNSEC 2011»
14 years 6 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou