Sciweavers

5758 search results - page 1148 / 1152
» Anonymity-preserving data collection
Sort
View
WISE
2002
Springer
14 years 11 days ago
Applying the Site Information to the Information Retrieval from the Web
In recent years, several information retrieval methods using information about the Web-links are developed, such as HITS and Trawling. In order to analyze the Web-links dividing i...
Yasuhito Asano, Hiroshi Imai, Masashi Toyoda, Masa...
SIGMETRICS
2010
ACM
143views Hardware» more  SIGMETRICS 2010»
14 years 9 days ago
Practical performance models for complex, popular applications
Perhaps surprisingly, no practical performance models exist for popular (and complex) client applications such as Adobe’s Creative Suite, Microsoft’s Office and Visual Studio...
Eno Thereska, Bjoern Doebel, Alice X. Zheng, Peter...
CDC
2009
IEEE
148views Control Systems» more  CDC 2009»
14 years 6 days ago
Comparison of reduced order lithium-ion battery models for control applications
— Lithium-ion batteries are the core of new plug-in hybrid-electrical vehicles (PHEV) as well as considered in many 2nd generation hybrid electric vehicles (HEV). In most cases t...
Carmelo Speltino, Domenico Di Domenico, Giovanni F...
MM
2009
ACM
206views Multimedia» more  MM 2009»
14 years 4 days ago
Adaptive, selective, automatic tonal enhancement of faces
This paper presents an efficient, personalizable and yet completely automatic algorithm for enhancing the brightness, tonal balance, and contrast of faces in thumbnails of online...
Hrishikesh Aradhye, George Toderici, Jay Yagnik
SAC
2009
ACM
14 years 4 days ago
Spam decisions on gray e-mail using personalized ontologies
E-mail is one of the most common communication methods among people on the Internet. However, the increase of e-mail misuse/abuse has resulted in an increasing volume of spam e-ma...
Seongwook Youn, Dennis McLeod
« Prev « First page 1148 / 1152 Last » Next »