Sciweavers

DASFAA
2014
IEEE
131views Database» more  DASFAA 2014»
11 years 12 months ago
Challenges for Dataset Search
David Maier, V. M. Megler, Kristin Tufte
CODASPY
2014
11 years 12 months ago
On the suitability of dissemination-centric access control systems for group-centric sharing
The Group-centric Secure Information Sharing (g-SIS) family of models has been proposed for modeling environments in which group dynamics dictate information-sharing policies and ...
William C. Garrison III, Yechen Qiao, Adam J. Lee
CHI
2014
ACM
11 years 12 months ago
Metaphone: machine aesthetics meets interaction design
Through our art project, Metaphone, we explored a particular form of aesthetics referred to in the arts tradition as machine aesthetics. The Metaphone machine collects the partici...
Vygandas Simbelis, Anders Lundström, Kristina...
CBDAR
2014
99views more  CBDAR 2014»
11 years 12 months ago
Spatially Prioritized and Persistent Text Detection and Decoding
—We show how to exploit temporal and spatial coherence to achieve efficient and effective text detection and decoding for a sensor suite moving through an environment in which t...
Hsueh-Cheng Wang, Yafim Landa, Maurice F. Fallon, ...
ACSC
2014
IEEE
11 years 12 months ago
An Adaptive Aggregate Maintenance Approach for Mixed Workloads in Columnar In-Memory Databases
The mixed database workloads generated by enterprise applications can be categorized into shortrunning transactional as well as long-running analytical queries with resource-inten...
Stephan Müller, Lars Butzmann, Stefan Klauck,...
56
Voted
ACE
2014
123views Education» more  ACE 2014»
11 years 12 months ago
The Australian Digital Technologies Curriculum: Challenge and Opportunity
There is a call for change in the treatment of ICT curriculum in our schools driven by the relatively recent acknowledgement of the growing importance of ICT in industry and socie...
Katrina Falkner, Rebecca Vivian, Nick Falkner

Publication
157views
12 years 6 months ago
From Semi-Supervised to Transfer Counting of Crowds
Regression-based techniques have shown promising results for people counting in crowded scenes. However, most existing techniques require expensive and laborious data annotation fo...
C. C. Loy, S. Gong, and T. Xiang

Publication
145views
12 years 6 months ago
POP: Person Re-Identification Post-Rank Optimisation
Owing to visual ambiguities and disparities, person re-identification methods inevitably produce suboptimal rank-list, which still requires exhaustive human eyeballing to identify ...
C. Liu, C. C. Loy, S. Gong, G. Wang

Publication
129views
12 years 6 months ago
Video Synopsis by Heterogeneous Multi-Source Correlation
Generating coherent synopsis for surveillance video stream remains a formidable challenge due to the ambiguity and uncertainty inherent to visual observations. In contrast to exist...
X. Zhu, C. C. Loy, and S. Gong

Publication
158views
12 years 6 months ago
Constrained Clustering: Effective Constraint Propagation with Imperfect Oracles
While clustering is usually an unsupervised operation, there are circumstances in which we have prior belief that pairs of samples should (or should not) be assigned to the same cl...
X. Zhu, C. C. Loy, and S. Gong