Sciweavers

326 search results - page 55 / 66
» Misuse detection for information retrieval systems
Sort
View
137
Voted
SPIESR
2003
230views Database» more  SPIESR 2003»
15 years 1 months ago
Bridging the semantic gap in sports
One of the major challenges facing current media management systems and related applications is the so-called ‘‘semantic gap’’ between the rich meaning that a user desires...
Baoxin Li, James H. Errico, Hao Pan, M. Ibrahim Se...
TOG
2008
236views more  TOG 2008»
15 years 7 days ago
Face swapping: automatically replacing faces in photographs
In this paper, we present a complete system for automatic face replacement in images. Our system uses a large library of face images created automatically by downloading images fr...
Dmitri Bitouk, Neeraj Kumar, Samreen Dhillon, Pete...
JSAC
2007
93views more  JSAC 2007»
15 years 7 days ago
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
— Vehicular Networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. However, security is a critical factor an...
Maxim Raya, Panagiotis Papadimitratos, Imad Aad, D...
SIGMOD
2010
ACM
267views Database» more  SIGMOD 2010»
15 years 5 months ago
Processing proximity relations in road networks
Applications ranging from location-based services to multi-player online gaming require continuous query support to monitor, track, and detect events of interest among sets of mov...
Zhengdao Xu, Hans-Arno Jacobsen
106
Voted
WWW
2007
ACM
16 years 1 months ago
Sliding window technique for the web log analysis
The results of the Web query log analysis may be significantly shifted depending on the fraction of agents (non-human clients), which are not excluded from the log. To detect and ...
Nikolai Buzikashvili