Sciweavers

1961 search results - page 106 / 393
» PicoDBMS: Validation and Experience
Sort
View
DLOG
2011
14 years 2 months ago
Repairing Incomplete Reasoners
Abstract. The pressing need for scalable query answering has motivated the development of many incomplete ontology-based reasoners. Improving the completeness of such systems witho...
Giorgos Stoilos, Bernardo Cuenca Grau
INFOCOM
2011
IEEE
14 years 2 months ago
Identity-based attack detection in mobile wireless networks
—Identity-based attacks (IBAs) are one of the most serious threats to wireless networks. Recently, received signal strength (RSS) based detection mechanisms were proposed to dete...
Kai Zeng, Kannan Govindan, Daniel Wu, Prasant Moha...
NAR
2011
183views Computer Vision» more  NAR 2011»
14 years 1 months ago
IGRhCellID: integrated genomic resources of human cell lines for identification
Cell line identification is emerging as an essential method for every cell line user in research community to avoid using misidentified cell lines for experiments and publications...
Cheng-Kai Shiau, De-Leung Gu, Chian-Feng Chen, Chi...
ICCV
2011
IEEE
13 years 11 months ago
Inferring Social Relations from Visual Concepts
In this paper, we study the problem of social relational inference using visual concepts which serve as indicators of actors’ social interactions. While social network analysis ...
Lei Ding, Alper Yilmaz
93
Voted
ICCV
2011
IEEE
13 years 11 months ago
Trajectory reconstruction from non-overlapping surveillance cameras with relative depth ordering constraints
We present a method for reconstructing a trajectory of an object moving in front of non-overlapping fully or partially calibrated cameras. The non-overlapping setup turns that pro...
Branislav Micusik