Sciweavers

16513 search results - page 3069 / 3303
» Numerical Analysis Methods
Sort
View
COMPSAC
2009
IEEE
15 years 10 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
CSE
2009
IEEE
15 years 10 months ago
TagRec: Leveraging Tagging Wisdom for Recommendation
—Due to the exponential growth of information on the Web, Recommender Systems have been developed to generate suggestions to help users overcome information overload and sift thr...
Tom Chao Zhou, Hao Ma, Irwin King, Michael R. Lyu
CIVR
2009
Springer
192views Image Analysis» more  CIVR 2009»
15 years 10 months ago
Example based video filters
Many of the successful multimedia retrieval systems focus on developing efficient and effective video retrieval solutions with the help of appropriate index structures. In these ...
Mihir Jain, Sreekanth Vempati, Chandrika Pulla, C....
ICIAR
2009
Springer
15 years 10 months ago
Image and Video Retargetting by Darting
This paper considers the problem of altering an image by imperceptibly adding or removing pixels, for example, to fit a differently shaped frame with minimal loss of interesting ...
Matthew Brand
DOCENG
2009
ACM
15 years 10 months ago
Annotations with EARMARK for arbitrary, overlapping and out-of order markup
In this paper we propose a novel approach to markup, called Extreme Annotational RDF Markup (EARMARK), using RDF and OWL to annotate features in text content that cannot be mapped...
Silvio Peroni, Fabio Vitali
« Prev « First page 3069 / 3303 Last » Next »