Sciweavers

18374 search results - page 3606 / 3675
» Applications for data hiding
Sort
View
AAAI
1998
13 years 10 months ago
Producing BT's Yellow Pages with Formation
This case study illustrates how the adoption of AI technology can bene t smaller companies as well as major corporations. Pindar Set is a small UK company which has originated the...
Gail Anderson, Andrew Casson-du Mont, Ann Macintos...
SPIESR
2003
230views Database» more  SPIESR 2003»
13 years 10 months ago
Bridging the semantic gap in sports
One of the major challenges facing current media management systems and related applications is the so-called ‘‘semantic gap’’ between the rich meaning that a user desires...
Baoxin Li, James H. Errico, Hao Pan, M. Ibrahim Se...
WM
2003
13 years 10 months ago
Knowledge discovery methods
: Coping with complex and dynamic environments forces companies to invest in the resource knowledge for the maintenance of their operational reliability; they have to create and to...
Stefan Smolnik
NIPS
1997
13 years 10 months ago
Extended ICA Removes Artifacts from Electroencephalographic Recordings
Severe contamination of electroencephalographic (EEG) activity by eye movements, blinks, muscle, heart and line noise is a serious problem for EEG interpretation and analysis. Rej...
Tzyy-Ping Jung, Colin Humphries, Te-Won Lee, Scott...
SOSP
1997
ACM
13 years 10 months ago
Cashmere-2L: Software Coherent Shared Memory on a Clustered Remote-Write Network
Low-latency remote-write networks, such as DEC’s Memory Channel, provide the possibility of transparent, inexpensive, large-scale shared-memory parallel computing on clusters of...
Robert Stets, Sandhya Dwarkadas, Nikos Hardavellas...
« Prev « First page 3606 / 3675 Last » Next »