Sciweavers

680 search results - page 45 / 136
» Analyzing the Effectiveness and Applicability of Co-training
Sort
View
PERCOM
2007
ACM
14 years 8 months ago
Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays
Activity monitoring, a crucial task in many applications, is often conducted expensively using video cameras. Also, effectively monitoring a large field by analyzing images from m...
Yunhao Liu, Lei Chen 0002, Jian Pei, Qiuxia Chen, ...
CGO
2005
IEEE
14 years 2 months ago
Performance of Runtime Optimization on BLAST
Optimization of a real world application BLAST is used to demonstrate the limitations of static and profile-guided optimizations and to highlight the potential of runtime optimiz...
Abhinav Das, Jiwei Lu, Howard Chen, Jinpyo Kim, Pe...
TRECVID
2008
13 years 10 months ago
The Orange Labs Real Time Video Copy Detection System - TrecVid 2008 Results
In this paper, we describe the content-based video copy detection system developed at Orange Labs. We also present the evaluation results of the TrecVid 2008 copy detection evalua...
Nicolas Gengembre, Sid-Ahmed Berrani
ECIS
2003
13 years 10 months ago
Conditions for change related to groupware in a distributed organization - a case study
Groupware is often used in distributed organizations to support communication and coordination. Managers direct resources and set up goals for the deployment of groupware. It is h...
Jesper Simonsen, Jens Kaaber Pors
ICDCS
2011
IEEE
12 years 8 months ago
Localizing Multiple Jamming Attackers in Wireless Networks
Abstract—Jamming attacks and unintentional radio interference are one of the most urgent threats harming the dependability of wireless communication and endangering the successfu...
Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu