Sciweavers

3072 search results - page 580 / 615
» Shape analysis algorithm based on information theory
Sort
View
CEAS
2007
Springer
15 years 3 months ago
Hardening Fingerprinting by Context
Near-duplicate detection is not only an important pre and post processing task in Information Retrieval but also an effective spam-detection technique. Among different approache...
Aleksander Kolcz, Abdur Chowdhury
CIKM
2007
Springer
15 years 3 months ago
Developing learning strategies for topic-based summarization
Most up-to-date well-behaved topic-based summarization systems are built upon the extractive framework. They score the sentences based on the associated features by manually assig...
Ouyang You, Sujian Li, Wenjie Li
ICIAR
2007
Springer
15 years 3 months ago
A Fast and Reliable Image Mosaicing Technique with Application to Wide Area Motion Detection
Abstract. Image mosaicing is stirring up a lot of interests in the research community for both its scientific significance and potential spinoff in real world applications. Bein...
Alessandro Bevilacqua, Pietro Azzari
MICCAI
2007
Springer
15 years 3 months ago
A Clinically Motivated 2-Fold Framework for Quantifying and Classifying Immunohistochemically Stained Specimens
Motivated by the current limitations of automated quantitative image analysis in discriminating among intracellular immunohistochemical (IHC) staining patterns, this paper presents...
Bonnie Hall, Wenjin Chen, Michael Reiss, David J. ...
VLDB
2007
ACM
160views Database» more  VLDB 2007»
15 years 3 months ago
Over-encryption: Management of Access Control Evolution on Outsourced Data
Data outsourcing is emerging today as a successful paradigm allowing users and organizations to exploit external services for the distribution of resources. A crucial problem to b...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...