Sciweavers

10156 search results - page 1995 / 2032
» Step by Step to Histories
Sort
View
ICC
2009
IEEE
171views Communications» more  ICC 2009»
14 years 9 months ago
IPsec-Based Anonymous Networking: A Working Implementation
Protecting users' privacy is becoming one of the rising issues for the success of future communications. The Internet in particular, with its open architecture, presents sever...
Csaba Király, Renato Lo Cigno
ICDM
2009
IEEE
145views Data Mining» more  ICDM 2009»
14 years 9 months ago
Significance of Episodes Based on Minimal Windows
Discovering episodes, frequent sets of events from a sequence has been an active field in pattern mining. Traditionally, a level-wise approach is used to discover all frequent epis...
Nikolaj Tatti
ICIP
2009
IEEE
14 years 9 months ago
Real-time optimal-memory image rotation for embedded systems
Skew-corrected document images are necessary for subsequent downstream operations such as archiving, printing or improving OCR performance. Image rotation is a necessary and more ...
Serene Banerjee, Anjaneyulu Kuchibhotla
ICTIR
2009
Springer
14 years 9 months ago
An Effective Approach to Verbose Queries Using a Limited Dependencies Language Model
Intuitively, any `bag of words' approach in IR should benefit from taking term dependencies into account. Unfortunately, for years the results of exploiting such dependencies ...
Eduard Hoenkamp, Peter Bruza, Dawei Song, Qiang Hu...
IGARSS
2009
14 years 9 months ago
Integrating Remote Sensing and Ancillary Data for Regional Ecosystem Assessment: Eucalyptus Grandis Agro-system in KwaZulu-Natal
The ability of various ecosystems to perform vital functions such as biodiversity production, and water, energy and nutrient cycling depends on the ecosystem state, i.e. health. E...
Moses Azong Cho, Jan van Aardt, Bongani Majeke, Ru...
« Prev « First page 1995 / 2032 Last » Next »