Sciweavers

122 search results - page 20 / 25
» Using Key Object Opportunism to Collect Old Objects
Sort
View
CVPR
2009
IEEE
16 years 4 months ago
Learning query-dependent prefilters for scalable image retrieval
We describe an algorithm for similar-image search which is designed to be efficient for extremely large collections of images. For each query, a small response set is selected by...
Lorenzo Torresani (Dartmouth College), Martin Szum...
KSEM
2007
Springer
15 years 3 months ago
Knowledge Engineering Technique for Cluster Development
After the concept of industry cluster was tangibly applied in many countries, SMEs trended to link to each other to maintain their competitiveness in the market. The major key succ...
Pradorn Sureephong, Nopasit Chakpitak, Yacine Ouzr...
INFOCOM
2002
IEEE
15 years 2 months ago
Efficient Distributed Path Selection for Shared Restoration Connections
—In MPLS/GMPLS networks, a range of restoration schemes will be required to support different tradeoffs between service interruption time and network resource utilization. In lig...
Guangzhi Li, Dongmei Wang, Charles R. Kalmanek, Ro...
ENTCS
2000
112views more  ENTCS 2000»
14 years 9 months ago
Typed Multiset Rewriting Specifications of Security Protocols
The language MSR has successfully been used in the past to prove undecidability about security protocols modeled according to the Dolev-Yao abstraction. In this paper, we revise t...
Iliano Cervesato
WSC
2007
14 years 12 months ago
A model for contact center analysis and simulation
In this paper we depart from a set of simple assumptions regarding the behavior of a pool of customers associated with an enterprise’s contact center. We assume that the pool of...
Juan M. Huerta