Sciweavers

320 search results - page 27 / 64
» An approach for implicitly detecting information needs
Sort
View
ICIP
2007
IEEE
14 years 9 months ago
Robust Hash for Detecting and Localizing Image Tampering
An image hash should be (1) robust to allowable operations and (2) sensitive to illegal manipulations (like image tampering) and distinct queries. Although existing methods try to...
Sujoy Roy, Qibin Sun
BMCBI
2010
155views more  BMCBI 2010»
13 years 7 months ago
A bi-ordering approach to linking gene expression with clinical annotations in gastric cancer
Background: In the study of cancer genomics, gene expression microarrays, which measure thousands of genes in a single assay, provide abundant information for the investigation of...
Fan Shi, Christopher Leckie, Geoff MacIntyre, Izha...
IJCAI
2003
13 years 9 months ago
Personalisation of Web Search
The availability of web search has revolutionised the way people discover information, yet as search services maintain larger and larger indexes they are in danger of becoming a v...
Kevin Keenoy, Mark Levene
SIBGRAPI
2000
IEEE
13 years 11 months ago
Ray Path Categorization
Edge detection and image segmentation algorithms usually operate on an image to extract geometrical information based on pixel colors. For ray-traced images, the presence of geomet...
Diego Nehab, Marcelo Gattass
HICSS
2007
IEEE
118views Biometrics» more  HICSS 2007»
14 years 2 months ago
Introducing Executable Product Models for the Service Industry
In these days, companies need highly flexible processes to deal with changing environments and competitors. Using traditional process models that have to be modeled in all detail...
Markus Kress, Joachim Melcher, Detlef Seese