Sciweavers

320 search results - page 51 / 64
» An approach for implicitly detecting information needs
Sort
View
TMC
2008
114views more  TMC 2008»
13 years 7 months ago
Toward Reliable and Efficient Reporting in Wireless Sensor Networks
Energy efficiency is one of the major concerns in wireless sensor networks, since it impacts the network lifetime. In this paper, we investigate the relationship between sensor net...
Fatma Bouabdallah, Nizar Bouabdallah, Raouf Boutab...
TRECVID
2008
13 years 9 months ago
The MediaMill TRECVID 2008 Semantic Video Search Engine
In this paper we describe our TRECVID 2008 video retrieval experiments. The MediaMill team participated in three tasks: concept detection, automatic search, and interactive search...
Cees G. M. Snoek, Koen E. A. van de Sande, Ork de ...
EUROSYS
2007
ACM
13 years 11 months ago
Discrete control for safe execution of IT automation workflows
As information technology (IT) administration becomes increasingly complex, workflow technologies are gaining popularity for IT automation. Writing correct workflow programs is no...
Yin Wang, Terence Kelly, Stéphane Lafortune
VISUAL
2000
Springer
13 years 11 months ago
Wavelet-Based Salient Points: Applications to Image Retrieval Using Color and Texture Features
In image retrieval, global features related to color or texture are commonly used to describe the image. The use of interest points in contentbased image retrieval allows image ind...
Etienne Loupias, Nicu Sebe
ESORICS
2007
Springer
14 years 1 months ago
Conditional Privacy-Aware Role Based Access Control
Privacy is considered critical for all organizations needing to manage individual related information. As such, there is an increasing need for access control models which can adeq...
Qun Ni, Dan Lin, Elisa Bertino, Jorge Lobo