Sciweavers

12289 search results - page 2149 / 2458
» computing 2006
Sort
View
154
Voted
DAGM
2006
Springer
15 years 8 months ago
Exploiting Low-Level Image Segmentation for Object Recognition
Abstract. A method for exploiting the information in low-level image segmentations for the purpose of object recognition is presented. The key idea is to use a whole ensemble of se...
Volker Roth, Björn Ommer
DALT
2006
Springer
15 years 8 months ago
Producing Compliant Interactions: Conformance, Coverage, and Interoperability
Agents in an open system interact with each other based on (typically, published) protocols. An agent may, however, deviate from the protocol because of its internal policies. Such...
Amit K. Chopra, Munindar P. Singh
161
Voted
DAMON
2006
Springer
15 years 8 months ago
Architecture-conscious hashing
Hashing is one of the fundamental techniques used to implement query processing operators such as grouping, aggregation and join. This paper studies the interaction between modern...
Marcin Zukowski, Sándor Héman, Peter...
DAS
2006
Springer
15 years 8 months ago
Exploratory Analysis System for Semi-structured Engineering Logs
Engineering diagnosis often involves analyzing complex records of system states printed to large, textual log files. Typically the logs are designed to accommodate the widest debug...
Michael Flaster, Bruce Hillyer, Tin Kam Ho
DASFAA
2006
IEEE
168views Database» more  DASFAA 2006»
15 years 8 months ago
COWES: Clustering Web Users Based on Historical Web Sessions
Clustering web users is one of the most important research topics in web usage mining. Existing approaches cluster web users based on the snapshots of web user sessions. They do no...
Ling Chen 0002, Sourav S. Bhowmick, Jinyan Li
« Prev « First page 2149 / 2458 Last » Next »