Sciweavers

18697 search results - page 3733 / 3740
» Systemic Security Management
Sort
View
MM
2010
ACM
191views Multimedia» more  MM 2010»
14 years 9 months ago
Quantifying tag representativeness of visual content of social images
Social tags describe images from many aspects including the visual content observable from the images, the context and usage of images, user opinions and others. Not all tags are ...
Aixin Sun, Sourav S. Bhowmick
CCECE
2009
IEEE
14 years 9 months ago
The Australian Coastal Ocean radar Network facility
The Australian Coastal Ocean radar Network (ACORN) is a monitoring network of HF radars which are being installed around Australia under a National Collaborative Research Infrastr...
Malcolm L. Heron
CLEF
2009
Springer
14 years 9 months ago
Diversity in Photo Retrieval: Overview of the ImageCLEFPhoto Task 2009
The ImageCLEF Photo Retrieval Task 2009 focused on image retrieval and diversity. A new collection was utilised in this task consisting of approximately half a million images with...
Monica Lestari Paramita, Mark Sanderson, Paul Clou...
EUSFLAT
2009
122views Fuzzy Logic» more  EUSFLAT 2009»
14 years 9 months ago
Production and Transportation Planning - A fuzzy Approach for Minimizing the Total Cost
Abstract-- In this paper, we deal with the production and transportation planning of a household appliances manufacturer that has production facilities and central stores for resel...
Heinrich J. Rommelfanger
ICDM
2009
IEEE
162views Data Mining» more  ICDM 2009»
14 years 9 months ago
The Flexible Climate Data Analysis Tools (CDAT) for Multi-model Climate Simulation Data
Being able to incorporate, inspect, and analyze data with newly developed technologies, diagnostics, and visualizations in an easy and flexible way has been a longstanding challen...
Dean N. Williams, Charles M. Doutriaux, Robert S. ...
« Prev « First page 3733 / 3740 Last » Next »