Sciweavers

12637 search results - page 2400 / 2528
» Security for Extensible Systems
Sort
View
EDM
2009
184views Data Mining» more  EDM 2009»
15 years 2 months ago
Process Mining Online Assessment Data
Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated throug...
Mykola Pechenizkiy, Nikola Trcka, Ekaterina Vasily...
ICC
2009
IEEE
152views Communications» more  ICC 2009»
15 years 2 months ago
Scalable Video-On-Demand Streaming in Mobile Wireless Hybrid Networks
Video-on-demand service in wireless networks is one important step to achieving the goal of providing video services anywhere anytime. Typically, carrier mobile networks are used t...
Tai T. Do, Kien A. Hua, Alexander J. Aved, Fuyu Li...
ICCSA
2010
Springer
15 years 1 months ago
An Aspect-Oriented Approach for Mobile Embedded Software Modeling
Recently, it is one of the most challenging fields in software engineering for embedded software development, since the advancement of embedded technologies has made our life incre...
Yong-Yi Fanjiang, Jong-Yih Kuo, Shang-Pin Ma, Wong...
CVPR
2011
IEEE
15 years 15 days ago
RUNE-Tag: a High Accuracy Fiducial Marker with Strong Occlusion Resilience
Over the last decades fiducial markers have provided widely adopted tools to add reliable model-based features into an otherwise general scene. Given their central role in many c...
Filippo Bergamasco, Andrea Albarelli, Andrea Torse...
CVPR
2011
IEEE
15 years 15 days ago
Face Image Retrieval by Shape Manipulation
Current face image retrieval methods achieve impressive results, but lack efficient ways to refine the search, particularly for geometric face attributes. Users cannot easily ...
Brandon Smith, Shengqi Zhu, Li Zhang
« Prev « First page 2400 / 2528 Last » Next »