Sciweavers

1050 search results - page 107 / 210
» Two methods of authenticated positioning
Sort
View
CIKM
2009
Springer
15 years 8 months ago
Post-rank reordering: resolving preference misalignments between search engines and end users
No search engine is perfect. A typical type of imperfection is the preference misalignment between search engines and end users, e.g., from time to time, web users skip higherrank...
Chao Liu, Mei Li, Yi-Min Wang
114
Voted
SIGSOFT
2004
ACM
15 years 7 months ago
Correlation exploitation in error ranking
Static program checking tools can find many serious bugs in software, but due to analysis limitations they also frequently emit false error reports. Such false positives can easi...
Ted Kremenek, Ken Ashcraft, Junfeng Yang, Dawson R...
BMCBI
2005
93views more  BMCBI 2005»
15 years 1 months ago
Two-part permutation tests for DNA methylation and microarray data
Background: One important application of microarray experiments is to identify differentially expressed genes. Often, small and negative expression levels were clipped-off to be e...
Markus Neuhäuser, Tanja Boes, Karl-Heinz J&ou...
CVPR
2008
IEEE
16 years 4 months ago
High resolution motion layer decomposition using dual-space graph cuts
We introduce a novel energy minimization method to decompose a video into a set of super-resolved moving layers. The proposed energy corresponds to the cost of coding the sequence...
Thomas Schoenemann, Daniel Cremers
ECCV
2002
Springer
16 years 3 months ago
Helmholtz Stereopsis: Exploiting Reciprocity for Surface Reconstruction
We present a method ? termed Helmholtz stereopsis ? for reconstructing the geometry of objects from a collection of images. Unlike existing methods for surface reconstruction (e.g...
Todd Zickler, Peter N. Belhumeur, David J. Kriegma...