Sciweavers

31 search results - page 6 / 7
» Towards the Complexity of Recognizing Pseudo-intents
Sort
View
HICSS
2005
IEEE
95views Biometrics» more  HICSS 2005»
14 years 23 hour ago
Understanding the Effect of Risk Aversion on Risk
As we progress, society must intelligently address the following question: How much risk is acceptable? How we answer this question could have important consequences for the futur...
U. S. Bhatt, David E. Newman, Benjamin A. Carreras...
ICASSP
2011
IEEE
12 years 10 months ago
Rapid image retrieval for mobile location recognition
Recognizing the location and orientation of a mobile device from captured images is a promising application of image retrieval algorithms. Matching the query images to an existing...
Georg Schroth, Anas Al-Nuaimi, Robert Huitl, Flori...
BIS
2007
178views Business» more  BIS 2007»
13 years 7 months ago
A Conversion Process From Flickr Tags to RDF Descriptions
The recent evolution of the Web, now designated by the term Web 2.0, has seen the appearance of a huge number of resources created and annotated by users. However the annotations ...
Mohamed Zied Maala, Alexandre Delteil, Ahmed Azoug...
CCE
2007
13 years 7 months ago
A Web Services based Approach for System on a Chip Design Planning
: The concept of Virtual Organisation (VO) offers various solutions to management, collaboration and coordination issues important for distributed collaborating teams. Deployment o...
Maciej Witczynski, Edward Hrynkiewicz, Adam Pawlak
SDM
2010
SIAM
256views Data Mining» more  SDM 2010»
13 years 7 months ago
The Application of Statistical Relational Learning to a Database of Criminal and Terrorist Activity
We apply statistical relational learning to a database of criminal and terrorist activity to predict attributes and event outcomes. The database stems from a collection of news ar...
B. Delaney, Andrew S. Fast, W. M. Campbell, C. J. ...