Sciweavers

6975 search results - page 1366 / 1395
» Personal Information Agent
Sort
View
SIGMETRICS
2008
ACM
128views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
Loss-aware network coding for unicast wireless sessions: design, implementation, and performance evaluation
Local network coding is growing in prominence as a technique to facilitate greater capacity utilization in multi-hop wireless networks. A specific objective of such local network ...
Shravan K. Rayanchu, Sayandeep Sen, Jianming Wu, S...
IJISEC
2007
119views more  IJISEC 2007»
14 years 9 months ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny
IJMMS
2007
91views more  IJMMS 2007»
14 years 9 months ago
Mining communities and their relationships in blogs: A study of online hate groups
Blogs, often treated as the equivalence of online personal diaries, have become one of the fastest growing types of Web-based media. Everyone is free to express their opinions and...
Michael Chau, Jennifer Jie Xu
TMM
2008
167views more  TMM 2008»
14 years 9 months ago
Mining Appearance Models Directly From Compressed Video
In this paper, we propose an approach to learning appearance models of moving objects directly from compressed video. The appearance of a moving object changes dynamically in vide...
Datong Chen, Qiang Liu, Mingui Sun, Jie Yang
JMM2
2007
218views more  JMM2 2007»
14 years 9 months ago
A Novel Method for 3D Face Detection and Normalization
—When automatically analyzing images of human faces, either for recognition in biometry applications or facial expression analysis in human machine interaction, one has to cope w...
Robert Niese, Ayoub Al-Hamadi, Bernd Michaelis
« Prev « First page 1366 / 1395 Last » Next »