Sciweavers

245 search results - page 49 / 49
» The Iterated Weakest Link
Sort
View
DEBU
1998
95views more  DEBU 1998»
14 years 9 months ago
What can you do with a Web in your Pocket?
The amount of information available online has grown enormously over the past decade. Fortunately, computing power, disk capacity, and network bandwidth have also increased dramat...
Sergey Brin, Rajeev Motwani, Lawrence Page, Terry ...
IJCV
2008
209views more  IJCV 2008»
14 years 8 months ago
Motion and Appearance Nonparametric Joint Entropy for Video Segmentation
This paper deals with video segmentation based on motion and spatial information. Classically, the motion term is based on a motion compensation error (MCE) between two consecutiv...
Sylvain Boltz, Ariane Herbulot, Eric Debreuve, Mic...
TSP
2010
14 years 4 months ago
On scalable distributed coding of correlated sources
Abstract--This paper considers the problem of scalable distributed coding of correlated sources that are communicated to a central unit, a setting typically encountered in sensor n...
Ankur Saxena, Kenneth Rose
BMCBI
2011
14 years 1 months ago
Acorn: A grid computing system for constraint based modeling and visualization of the genome scale metabolic reaction networks v
Background: Constraint-based approaches facilitate the prediction of cellular metabolic capabilities, based, in turn on predictions of the repertoire of enzymes encoded in the gen...
Jacek Sroka, Lukasz Bieniasz-Krzywiec, Szymon Gwoz...
SIGIR
2012
ACM
12 years 12 months ago
Fighting against web spam: a novel propagation method based on click-through data
Combating Web spam is one of the greatest challenges for Web search engines. State-of-the-art anti-spam techniques focus mainly on detecting varieties of spam strategies, such as ...
Chao Wei, Yiqun Liu, Min Zhang, Shaoping Ma, Liyun...