Sciweavers

6423 search results - page 1171 / 1285
» Maintaining Information Resources
Sort
View
INFOCOM
1989
IEEE
15 years 1 months ago
An Efficient Multiple-Access Method for the Binary Adder Channel
Consider M - HChoose P - T communications: T users or less, out of M potential users, are chosen at random to simultaneously transmit binary data over a common channel. A method f...
Israel Bar-David, Eli Plotnik, Raphael Rom
CIVR
2010
Springer
427views Image Analysis» more  CIVR 2010»
15 years 1 months ago
An efficient method for face retrieval from large video datasets
The human face is one of the most important objects in videos since it provides rich information for spotting certain people of interest, such as government leaders in news video,...
Thao Ngoc Nguyen, Thanh Duc Ngo, Duy-Dinh Le, Shin...
AAAI
2008
15 years 11 days ago
Using a Geometric-Based Sketch Recognition Approach to Sketch Chinese Radicals
Unlike English, where unfamiliar words can be queried for its meaning by typing out its letters, the analogous operation in Chinese is far from trivial due to the nature of its wr...
Paul Taele, Tracy Hammond
MOBISYS
2010
ACM
15 years 11 days ago
Growing an organic indoor location system
Most current methods for 802.11-based indoor localization depend on surveys conducted by experts or skilled technicians. Some recent systems have incorporated surveying by users. ...
Jun-geun Park, Ben Charrow, Dorothy Curtis, Jonath...
AVI
2008
15 years 11 days ago
SyncDecor: communication appliances for virtual cohabitation
Despite the fact that various means of communication such as mobile phones, instant messenger and e-mail are now widespread; many romantic couples separated by long distances worr...
Hitomi Tsujita, Koji Tsukada, Itiro Siio
« Prev « First page 1171 / 1285 Last » Next »