Sciweavers

658 search results - page 115 / 132
» Arguing from Experience to Classifying Noisy Data
Sort
View
CEAS
2008
Springer
13 years 9 months ago
Tracking Email Reputation for Authenticated Sender Identities
With the amount of unsolicited emails on the rise, domain authentication schemes have been widely deployed to identify senders. Establishing a sender's identity does not guar...
Gautam Singaraju, Jeffrey Moss, Brent ByungHoon Ka...
SENSYS
2005
ACM
14 years 1 months ago
TSAR: a two tier sensor storage architecture using interval skip graphs
Archival storage of sensor data is necessary for applications that query, mine, and analyze such data for interesting features and trends. We argue that existing storage systems a...
Peter Desnoyers, Deepak Ganesan, Prashant J. Sheno...
ICS
2003
Tsinghua U.
14 years 23 days ago
Inferential queueing and speculative push for reducing critical communication latencies
Communication latencies within critical sections constitute a major bottleneck in some classes of emerging parallel workloads. In this paper, we argue for the use of Inferentially...
Ravi Rajwar, Alain Kägi, James R. Goodman
ICCV
2007
IEEE
14 years 9 months ago
A Study of Face Recognition as People Age
In this paper we study face recognition across ages within a real passport photo verification task. First, we propose using the gradient orientation pyramid for this task. Discard...
Haibin Ling, Stefano Soatto, Narayanan Ramanathan,...
HICSS
2008
IEEE
83views Biometrics» more  HICSS 2008»
14 years 2 months ago
What, Who and Where: Insights into Personalization
Personalization is a phenomenon that intrigues and confuses. Personalized offerings promise customer attention, loyalty and safe haven against commoditization. However, these prom...
Anne Sunikka, Johanna Bragge