Sciweavers

5962 search results - page 1079 / 1193
» Working with Patterns and Code
Sort
View
GLVLSI
2005
IEEE
99views VLSI» more  GLVLSI 2005»
15 years 9 months ago
An empirical study of crosstalk in VDSM technologies
We perform a detailed study of various crosstalk scenarios in VDSM technologies by using a distributed model of the crosstalk site and make a number of key observations about the ...
Shahin Nazarian, Massoud Pedram, Emre Tuncer
159
Voted
ICAIL
2005
ACM
15 years 9 months ago
Effective Document Clustering for Large Heterogeneous Law Firm Collections
Computational resources for research in legal environments have historically implied remote access to large databases of legal documents such as case law, statutes, law reviews an...
Jack G. Conrad, Khalid Al-Kofahi, Ying Zhao, Georg...
146
Voted
MIR
2005
ACM
137views Multimedia» more  MIR 2005»
15 years 9 months ago
A content-based image retrieval system for fish taxonomy
It is estimated that less than ten percent of the world’s species have been discovered and described. The main reason for the slow pace of new species description is that the sc...
Yixin Chen, Henry L. Bart Jr., Fei Teng
124
Voted
MIR
2005
ACM
141views Multimedia» more  MIR 2005»
15 years 9 months ago
A mutual semantic endorsement approach to image retrieval and context provision
Learning semantics from annotated images to enhance content-based retrieval is an important research direction. In this paper, annotation data are assumed available for only a sub...
Jia Li
147
Voted
MOBICOM
2005
ACM
15 years 9 months ago
Barrier coverage with wireless sensors
In old times, castles were surrounded by moats (deep trenches filled with water, and even alligators) to thwart or discourage intrusion attempts. One can now replace such barrier...
Santosh Kumar, Ten-Hwang Lai, Anish Arora
« Prev « First page 1079 / 1193 Last » Next »