Sciweavers

2399 search results - page 479 / 480
» On Authentication between Human and Computer
Sort
View
DAM
2007
131views more  DAM 2007»
13 years 5 months ago
Haplotyping with missing data via perfect path phylogenies
Computational methods for inferring haplotype information from genotype data are used in studying the association between genomic variation and medical condition. Recently, Gusfi...
Jens Gramm, Till Nierhoff, Roded Sharan, Till Tant...
PVLDB
2008
160views more  PVLDB 2008»
13 years 5 months ago
BayesStore: managing large, uncertain data repositories with probabilistic graphical models
Several real-world applications need to effectively manage and reason about large amounts of data that are inherently uncertain. For instance, pervasive computing applications mus...
Daisy Zhe Wang, Eirinaios Michelakis, Minos N. Gar...
JCST
2010
119views more  JCST 2010»
13 years 4 months ago
Location, Localization, and Localizability
Abstract Location-aware technology spawns numerous unforeseen pervasive applications in a wide range of living, production, commence, and public services. This article provides an ...
Yunhao Liu, Zheng Yang, Xiaoping Wang, Lirong Jian
IMC
2010
ACM
13 years 4 months ago
The impact of YouTube recommendation system on video views
Hosting a collection of millions of videos, YouTube offers several features to help users discover the videos of their interest. For example, YouTube provides video search, relate...
Renjie Zhou, Samamon Khemmarat, Lixin Gao
PAMI
2011
13 years 1 months ago
View-Independent Action Recognition from Temporal Self-Similarities
— This paper addresses recognition of human actions under view changes. We explore self-similarities of action sequences over time and observe the striking stability of such meas...
Imran N. Junejo, Emilie Dexter, Ivan Laptev, Patri...