Sciweavers

1581 search results - page 309 / 317
» Competitive intelligence process and tools for intelligence ...
Sort
View
CACM
2004
87views more  CACM 2004»
13 years 7 months ago
Questioning lawful access to traffic data
- After some successes and many mis-steps, the regulatory environment surrounding technology policy is transforming. Lessons taken from content, copyright, and cryptography policy ...
Alberto Escudero-Pascual, Ian Hosein
SIGMOD
2004
ACM
262views Database» more  SIGMOD 2004»
14 years 7 months ago
The Next Database Revolution
Database system architectures are undergoing revolutionary changes. Most importantly, algorithms and data are being unified by integrating programming languages with the database ...
Jim Gray
CIVR
2007
Springer
164views Image Analysis» more  CIVR 2007»
14 years 1 months ago
Inducing a perceptual relevance shape classifier
In this paper, we develop a system to classify the outputs of image segmentation algorithms as perceptually relevant or perceptually irrelevant with respect to human perception. T...
Victoria J. Hodge, John P. Eakins, James Austin
SIGGRAPH
2000
ACM
13 years 11 months ago
Acquiring the reflectance field of a human face
We present a method to acquire the reflectance field of a human face and use these measurements to render the face under arbitrary changes in lighting and viewpoint. We first acqu...
Paul E. Debevec, Tim Hawkins, Chris Tchou, Haarm-P...
IJCINI
2007
125views more  IJCINI 2007»
13 years 7 months ago
A Unified Approach To Fractal Dimensions
The Cognitive Processes of Abstraction and Formal Inferences J. A. Anderson: A Brain-Like Computer for Cognitive Software Applications: the Resatz Brain Project L. Flax: Cognitive ...
Witold Kinsner