Sciweavers

558 search results - page 88 / 112
» Safe and Effective Determinant Evaluation
Sort
View
VLDB
2010
ACM
190views Database» more  VLDB 2010»
14 years 10 months ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authentic...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
IAT
2010
IEEE
14 years 9 months ago
Multiagent Meta-level Control for a Network of Weather Radars
It is crucial for embedded systems to adapt to the dynamics of open environments. This adaptation process becomes especially challenging in the context of multiagent systems. In t...
Shanjun Cheng, Anita Raja, Victor R. Lesser
ICCV
2009
IEEE
14 years 9 months ago
Modeling 3D human poses from uncalibrated monocular images
This paper introduces an efficient algorithm that reconstructs 3D human poses as well as camera parameters from a small number of 2D point correspondences obtained from uncalibrat...
Xiaolin K. Wei, Jinxiang Chai
CVPR
2011
IEEE
14 years 7 months ago
Illumination Estimation and Cast Shadow Detection through a Higher-order Graphical Model
In this paper, we propose a novel framework to jointly recover the illumination environment and an estimate of the cast shadows in a scene from a single image, given coarse 3D geo...
Alexandros Panagopoulos, Chaohui Wang, Dimitris Sa...
COLING
2010
14 years 6 months ago
Learning the Scope of Negation via Shallow Semantic Parsing
In this paper we present a simplified shallow semantic parsing approach to learning the scope of negation (SoN). This is done by formulating it as a shallow semantic parsing probl...
Junhui Li, Guodong Zhou, Hongling Wang, Qiaoming Z...