Sciweavers

2200 search results - page 278 / 440
» An Entity-Level Approach to Information Extraction
Sort
View
DMIN
2009
222views Data Mining» more  DMIN 2009»
13 years 5 months ago
P-Sensitive K-Anonymity for Social Networks
-- The proliferation of social networks, where individuals share private information, has caused, in the last few years, a growth in the volume of sensitive data being stored in th...
Roy Ford, Traian Marius Truta, Alina Campan
GIS
2009
ACM
14 years 17 days ago
Conceptualization of place via spatial clustering and co-occurrence analysis
More and more users are contributing and sharing more and more contents on the Web via the use of content hosting sites and social media services. These user–generated contents ...
Dong-Po Deng, Tyng-Ruey Chuang, Rob Lemmens
ACCV
2009
Springer
13 years 12 months ago
People Tracking and Segmentation Using Efficient Shape Sequences Matching
Abstract. We design an effective shape prior embedded human silhouettes extraction algorithm. Human silhouette extraction is found challenging because of articulated structures, po...
Junqiu Wang, Yasushi Yagi, Yasushi Makihara
MVA
2007
211views Computer Vision» more  MVA 2007»
13 years 9 months ago
Vision-based UAV Navigation in Mountain Area
Most vision-based UAV (Unmanned Aerial Vehicle) navigation algorithms extract manmade features such as buildings or roads, which are well structured in urban terrain, using the CC...
Jihwan Woo, Kilho Son, Teng Li, Gwan Sung Kim, In-...
MODELS
2007
Springer
14 years 2 months ago
A UML Profile for Developing Airworthiness-Compliant (RTCA DO-178B), Safety-Critical Software
Many safety-related and certification standards exist for developing safety-critical systems. Safety assessments are performed in practice, and system certification according to a...
Gregory Zoughbi, Lionel C. Briand, Yvan Labiche