Sciweavers

651 search results - page 129 / 131
» Abbreviated text input
Sort
View
MIS
2006
Springer
159views Multimedia» more  MIS 2006»
13 years 7 months ago
Personalized avatars for mobile entertainment
LiveMail is a prototype system that allows mobile subscribers to communicate using personalized 3D face models created from images taken by their phone cameras. The user takes a s...
Tomislav Kosutic, Miran Mosmondor, Ivan Andrisek, ...
TPDS
1998
92views more  TPDS 1998»
13 years 7 months ago
An Efficient Algorithm for Row Minima Computations on Basic Reconfigurable Meshes
—A matrix A of size m œ n containing items from a totally ordered universe is termed monotone if, for every i, j, 1 ‹ i < j ‹ m, the minimum value in row j lies below or to...
Koji Nakano, Stephan Olariu
CIKM
2010
Springer
13 years 6 months ago
Who should I cite: learning literature search models from citation behavior
Scientists depend on literature search to find prior work that is relevant to their research ideas. We introduce a retrieval model for literature search that incorporates a wide ...
Steven Bethard, Dan Jurafsky
MICS
2010
81views more  MICS 2010»
13 years 6 months ago
Tactics for Hierarchical Proof
Abstract. There is something of a discontinuity at the heart of popular tactical theorem provers. Low-level, fully-checked mechanical proofs are large trees consisting of primitive...
David Aspinall, Ewen Denney, Christoph Lüth
IMC
2010
ACM
13 years 5 months ago
What happened in my network: mining network events from router syslogs
Router syslogs are messages that a router logs to describe a wide range of events observed by it. They are considered one of the most valuable data sources for monitoring network ...
Tongqing Qiu, Zihui Ge, Dan Pei, Jia Wang, Jun Xu