Sciweavers

18374 search results - page 3606 / 3675
» Applications for data hiding
Sort
View
96
Voted
AAAI
1998
15 years 4 months ago
Producing BT's Yellow Pages with Formation
This case study illustrates how the adoption of AI technology can bene t smaller companies as well as major corporations. Pindar Set is a small UK company which has originated the...
Gail Anderson, Andrew Casson-du Mont, Ann Macintos...
165
Voted
SPIESR
2003
230views Database» more  SPIESR 2003»
15 years 4 months ago
Bridging the semantic gap in sports
One of the major challenges facing current media management systems and related applications is the so-called ‘‘semantic gap’’ between the rich meaning that a user desires...
Baoxin Li, James H. Errico, Hao Pan, M. Ibrahim Se...
WM
2003
15 years 4 months ago
Knowledge discovery methods
: Coping with complex and dynamic environments forces companies to invest in the resource knowledge for the maintenance of their operational reliability; they have to create and to...
Stefan Smolnik
119
Voted
NIPS
1997
15 years 4 months ago
Extended ICA Removes Artifacts from Electroencephalographic Recordings
Severe contamination of electroencephalographic (EEG) activity by eye movements, blinks, muscle, heart and line noise is a serious problem for EEG interpretation and analysis. Rej...
Tzyy-Ping Jung, Colin Humphries, Te-Won Lee, Scott...
SOSP
1997
ACM
15 years 4 months ago
Cashmere-2L: Software Coherent Shared Memory on a Clustered Remote-Write Network
Low-latency remote-write networks, such as DEC’s Memory Channel, provide the possibility of transparent, inexpensive, large-scale shared-memory parallel computing on clusters of...
Robert Stets, Sandhya Dwarkadas, Nikos Hardavellas...
« Prev « First page 3606 / 3675 Last » Next »