Sciweavers

3110 search results - page 560 / 622
» On the initialization of the DNMF algorithm
Sort
View
SAC
2005
ACM
15 years 10 months ago
Automatic learning of text-to-concept mappings exploiting WordNet-like lexical networks
A great jump towards the advent of the Semantic Web will take place when a critical mass of web resources is available for use in a semantic way. This goal can be reached by the c...
Dario Bonino, Fulvio Corno, Federico Pescarmona
CVBIA
2005
Springer
15 years 10 months ago
Local or Global Minima: Flexible Dual-Front Active Contours
Most variational active contour models are designed to find the “desirable” local minima of data-dependent energy functionals with the hope of avoiding undesirable configurat...
Hua Li, Anthony J. Yezzi
ESA
2005
Springer
108views Algorithms» more  ESA 2005»
15 years 10 months ago
Bootstrapping a Hop-Optimal Network in the Weak Sensor Model
Sensor nodes are very weak computers that get distributed at random on a surface. Once deployed, they must wake up and form a radio network. Sensor network bootstrapping research t...
Martin Farach-Colton, Rohan J. Fernandes, Miguel A...
OOPSLA
2005
Springer
15 years 10 months ago
Estimating software based on use case points
It is well documented that software product cost estimates are notoriously inaccurate across the software industry. Creating accurate cost estimates for software product developme...
Edward R. Carroll
MMSEC
2004
ACM
104views Multimedia» more  MMSEC 2004»
15 years 10 months ago
Key-assignment strategies for CPPM
CSS, the first system to protect multimedia content on the new DVD medium failed badly, because both its encryption algorithm and its key management could easily be broken. A new ...
André Adelsbach, Jörg Schwenk