Sciweavers

7853 search results - page 1300 / 1571
» Learning from Each Other
Sort
View
89
Voted
TKDE
2008
117views more  TKDE 2008»
15 years 18 days ago
Competitor Mining with the Web
This paper is concerned with the problem of mining competitors from the Web automatically. Nowadays, the fierce competition in the market necessitates every company to know not onl...
Shenghua Bao, Rui Li, Yong Yu, Yunbo Cao
TKDE
2008
103views more  TKDE 2008»
15 years 18 days ago
Detecting Word Substitutions in Text
Searching for words on a watchlist is one way in which large-scale surveillance of communication can be done, for example, in intelligence and counterterrorism settings. One obviou...
SzeWang Fong, Dmitri Roussinov, David B. Skillicor...
89
Voted
TMI
2008
135views more  TMI 2008»
15 years 18 days ago
A Factorization Approach for Cone-Beam Reconstruction on a Circular Short-Scan
In this paper, we introduce a new algorithm for 3-D image reconstruction from cone-beam (CB) projections acquired along a partial circular scan. Our algorithm is based on a novel, ...
Frank Dennerlein, Frédéric Noo, H. S...
JCIT
2007
142views more  JCIT 2007»
15 years 18 days ago
Distributed Certification Authority for Mobile Ad Hoc Networks - A Dynamic Approach
A Mobile Ad Hoc Network (MANET) is an infrastructureless network of wireless mobile nodes that cooperate among each other to maintain connectivity of the network. In comparison to...
Sanjay Raghani, Durga Toshniwal
121
Voted
TOG
2008
116views more  TOG 2008»
15 years 18 days ago
A photometric approach for estimating normals and tangents
This paper presents a technique for acquiring the shape of realworld objects with complex isotropic and anisotropic reflectance. Our method estimates the local normal and tangent ...
Michael Holroyd, Jason Lawrence, Greg Humphreys, T...
« Prev « First page 1300 / 1571 Last » Next »