Sciweavers

3555 search results - page 613 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
DCG
2010
289views more  DCG 2010»
15 years 1 months ago
Algorithms for Approximate Shortest Path Queries on Weighted Polyhedral Surfaces
We consider the well known geometric problem of determining shortest paths between pairs of points on a polyhedral surface P, where P consists of triangular faces with positive we...
Lyudmil Aleksandrov, Hristo Djidjev, Hua Guo, Anil...
CORR
2007
Springer
151views Education» more  CORR 2007»
15 years 1 months ago
Exploiting Multi-Antennas for Opportunistic Spectrum Sharing in Cognitive Radio Networks
—In cognitive radio (CR) networks, there are scenarios where the secondary (lower priority) users intend to communicate with each other by opportunistically utilizing the transmi...
Rui Zhang, Ying-Chang Liang
ICCV
2005
IEEE
16 years 3 months ago
When Does a Camera See Rain?
Rain produces sharp intensity fluctuations in images and videos, which degrade the performance of outdoor vision systems. These intensity fluctuations depend on various factors, s...
Kshitiz Garg, Shree K. Nayar
SIGIR
2003
ACM
15 years 6 months ago
Transliteration of proper names in cross-language applications
Translation of proper names is generally recognized as a significant problem in many multi-lingual text and speech processing applications. Even when large bilingual lexicons use...
Paola Virga, Sanjeev Khudanpur
SIGMOD
2007
ACM
413views Database» more  SIGMOD 2007»
16 years 1 months ago
Effective keyword-based selection of relational databases
The wide popularity of free-and-easy keyword based searches over World Wide Web has fueled the demand for incorporating keyword-based search over structured databases. However, mo...
Bei Yu, Guoliang Li, Karen R. Sollins, Anthony K. ...