Sciweavers

14967 search results - page 2804 / 2994
» Visualization
Sort
View
CANS
2009
Springer
152views Cryptology» more  CANS 2009»
15 years 5 months ago
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding
When users wish to establish wireless communication between their devices, the channel needs to be bootstrapped first. Usually, the channel is desired to be authenticated and con...
Mario Cagalj, Nitesh Saxena, Ersin Uzun
ATAL
2009
Springer
15 years 5 months ago
Actor-agent application for train driver rescheduling
This paper describes the design, implementation, visualizations, results and lessons learned of a novel real-world socio-technical research system for the purpose of rescheduling ...
Erwin J. W. Abbink, David G. A. Mobach, Pieter-Jan...
75
Voted
CIKM
2009
Springer
15 years 5 months ago
Reducing the risk of query expansion via robust constrained optimization
We introduce a new theoretical derivation, evaluation methods, and extensive empirical analysis for an automatic query expansion framework in which model estimation is cast as a r...
Kevyn Collins-Thompson
CIVR
2009
Springer
192views Image Analysis» more  CIVR 2009»
15 years 5 months ago
Example based video filters
Many of the successful multimedia retrieval systems focus on developing efficient and effective video retrieval solutions with the help of appropriate index structures. In these ...
Mihir Jain, Sreekanth Vempati, Chandrika Pulla, C....
CIVR
2009
Springer
212views Image Analysis» more  CIVR 2009»
15 years 5 months ago
Video copy detection by fast sequence matching
Sequence matching techniques are effective for comparing two videos. However, existing approaches suffer from demanding computational costs and thus are not scalable for large-sca...
Mei-Chen Yeh, Kwang-Ting Cheng
« Prev « First page 2804 / 2994 Last » Next »