Sciweavers

409 search results - page 68 / 82
» Review spam detection
Sort
View
DEXAW
2006
IEEE
116views Database» more  DEXAW 2006»
15 years 5 months ago
Architecture Evaluation for Distributed Auto-ID Systems
Auto-ID technologies allow capturing the time and location of products in the supply chain for tracking and tracing. This paves the way for a variety of business applications, suc...
Hong Hai Do, Jürgen Anke, Gregor Hackenbroich
ISESE
2006
IEEE
15 years 5 months ago
A literature survey of the quality economics of defect-detection techniques
Over the last decades, a considerable amount of empirical knowledge about the efficiency of defect-detection techniques has been accumulated. Also a few surveys have summarised th...
Stefan Wagner
RTCSA
2005
IEEE
15 years 5 months ago
An Overview of the VigilNet Architecture
Battlefield surveillance often involves a high element of risk for military operators. Hence, it is very important for the military to execute unmanned surveillance by using larg...
Tian He, Liqian Luo, Ting Yan, Lin Gu, Qing Cao, G...
ATAL
2005
Springer
15 years 5 months ago
Lessons learned from autonomous sciencecraft experiment
An Autonomous Science Agent has been flying onboard the Earth Observing One Spacecraft since 2003. This software enables the spacecraft to autonomously detect and responds to scie...
Steve A. Chien, Rob Sherwood, Daniel Tran, Benjami...
KES
2005
Springer
15 years 5 months ago
Comparison of Feature Extraction Techniques for Watermark Synchronization
Abstract. This paper evaluates feature extraction techniques in aspect of watermark synchronization. Most watermarking algorithms suffer from geometric distortion attacks that desy...
Hae-Yeoun Lee, Heung-Kyu Lee, Junseok Lee