Sciweavers

2299 search results - page 410 / 460
» Logical Data Expiration
Sort
View
104
Voted
CVPR
2011
IEEE
14 years 7 months ago
Enforcing Similarity Constraints with Integer Programming for Better Scene Text Recognition
The recognition of text in everyday scenes is made difficult by viewing conditions, unusual fonts, and lack of linguistic context. Most methods integrate a priori appearance info...
David Smith, Jacqueline Feild, Eric Learned-Miller
ADVSE
2010
103views more  ADVSE 2010»
14 years 6 months ago
Extending Conceptual Schemas with Business Process Information
Abstract. The specification of business processes is becoming a more and more critical aspect for organizations. Such processes are specified as workflow models expressing the logi...
Marco Brambilla, Jordi Cabot, Sara Comai
IJNSEC
2011
167views more  IJNSEC 2011»
14 years 5 months ago
New Real Time Multicast Authentication Protocol
Multicast gives professional large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communications. There is a number of s...
Riham Abdellatif, Heba Kamal Aslan, Salwa H. Elram...
161
Voted
SIGSOFT
2011
ACM
14 years 5 months ago
Modeling a distributed intrusion detection system using collaborative building blocks
Developing complex distributed systems is a non-trivial task. It is even more difficult when the systems need to dynamically reconfigure the distributed functionalities or tasks...
Linda Ariani Gunawan, Michael Vogel, Frank Alexand...
TVCG
2011
100views more  TVCG 2011»
14 years 5 months ago
Tugging Graphs Faster: Efficiently Modifying Path-Preserving Hierarchies for Browsing Paths
—Many graph visualization systems use graph hierarchies to organize a large input graph into logical components. These approaches detect features globally in the data and place t...
Daniel Archambault, Tamara Munzner, David Auber