Sciweavers

1240 search results - page 193 / 248
» Composition with Target Constraints
Sort
View
ICAC
2008
IEEE
14 years 4 months ago
An Adaptive Middleware for Supporting Time-Critical Event Response
Abstract— There are many applications where a timely response to an important event is needed. Often such response can require significant computation and possibly communication...
Qian Zhu, Gagan Agrawal
ICDM
2008
IEEE
136views Data Mining» more  ICDM 2008»
14 years 4 months ago
Generalized Framework for Syntax-Based Relation Mining
Supervised approaches to Data Mining are particularly appealing as they allow for the extraction of complex relations from data objects. In order to facilitate their application i...
Bonaventura Coppola, Alessandro Moschitti, Daniele...
ICIW
2008
IEEE
14 years 4 months ago
Graphical History List with Multi-window Support on a Mobile Web Browser
— Rolling back to previously visited Web pages and opening multiple browser windows or tabs at the same time are common activities in a Web browsing session on a PC. When using a...
Elina Vartiainen, Virpi Roto, Janne Kaasalainen
IROS
2008
IEEE
258views Robotics» more  IROS 2008»
14 years 4 months ago
3D active appearance model for aligning faces in 2D images
Abstract— Perceiving human faces is one of the most important functions for human robot interaction. The active appearance model (AAM) is a statistical approach that models the s...
Chun-Wei Chen, Chieh-Chih Wang
ISM
2008
IEEE
111views Multimedia» more  ISM 2008»
14 years 4 months ago
Secure and Low Cost Selective Encryption for JPEG2000
Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach ...
Ayoub Massoudi, Frédéric Lefè...