Sciweavers

718 search results - page 137 / 144
» Toward Models for Forensic Analysis
Sort
View
TCSV
2002
90views more  TCSV 2002»
14 years 9 months ago
Shot-boundary detection: unraveled and resolved?
Partitioning a video sequence into shots is the first step toward video-content analysis and content-based video browsing and retrieval. A video shot is defined as a series of inte...
Alan Hanjalic
MM
2010
ACM
271views Multimedia» more  MM 2010»
14 years 7 months ago
Large-scale music tag recommendation with explicit multiple attributes
Social tagging can provide rich semantic information for largescale retrieval in music discovery. Such collaborative intelligence, however, also generates a high degree of tags un...
Zhendong Zhao, Xinxi Wang, Qiaoliang Xiang, Andy M...
KDD
2007
ACM
160views Data Mining» more  KDD 2007»
15 years 10 months ago
Show me the money!: deriving the pricing power of product features by mining consumer reviews
The increasing pervasiveness of the Internet has dramatically changed the way that consumers shop for goods. Consumergenerated product reviews have become a valuable source of inf...
Nikolay Archak, Anindya Ghose, Panagiotis G. Ipeir...
WSDM
2010
ACM
188views Data Mining» more  WSDM 2010»
15 years 7 months ago
Anatomy of the Long Tail: Ordinary People with Extraordinary Tastes
The success of "infinite-inventory" retailers such as Amazon.com and Netflix has been ascribed to a "long tail" phenomenon. To wit, while the majority of their...
Andrei Z. Broder, Bo Pang, Evgeniy Gabrilovich, Sh...
ASIACRYPT
2009
Springer
15 years 4 months ago
Security Notions and Generic Constructions for Client Puzzles
Computational puzzles are mildly difficult computational problems that require resources (processor cycles, memory, or both) to solve. Puzzles have found a variety of uses in secu...
Liqun Chen, Paul Morrissey, Nigel P. Smart, Bogdan...