Sciweavers

1929 search results - page 372 / 386
» An Approach to Limit the Wynot Problem
Sort
View
ICDM
2008
IEEE
235views Data Mining» more  ICDM 2008»
14 years 3 months ago
DECK: Detecting Events from Web Click-Through Data
In the past few years there has been increased research interest in detecting previously unidentified events from Web resources. Our focus in this paper is to detect events from ...
Ling Chen 0002, Yiqun Hu, Wolfgang Nejdl
GLOBECOM
2007
IEEE
14 years 3 months ago
Minimum Coverage Breach and Maximum Network Lifetime in Wireless Sensor Networks
—Network lifetime is a critical issue in Wireless Sensor Networks. It is possible to extend network lifetime by organizing the sensors into a number of sensor covers. However, wi...
Chen Wang, My T. Thai, Yingshu Li, Feng Wang 0002,...
KBSE
2007
IEEE
14 years 2 months ago
Ensuring consistency in long running transactions
Flow composition languages permit the construction of longrunning transactions from collections of independent, atomic services. Due to environmental limitations, such transaction...
Jeffrey Fischer, Rupak Majumdar
CVPR
2010
IEEE
14 years 2 months ago
ARISTA - Image Search to Annotation on Billions of Web Photos
Though it has cost great research efforts for decades, object recognition is still a challenging problem. Traditional methods based on machine learning or computer vision are stil...
Xin-Jing Wang, Ming Liu, Lei Zhang, Yi Li, Wei-Yin...
DGCI
2005
Springer
14 years 2 months ago
Arbitrary 3D Resolution Discrete Ray Tracing of Implicit Surfaces
A new approach to ray tracing implicit surfaces based on recursive space subdivision is presented in this paper. Interval arithmetic, already used to calculate intersections in ray...
Nilo Stolte