Sciweavers

1663 search results - page 144 / 333
» Computer Security in the Real World
Sort
View
153
Voted
ISVC
2009
Springer
15 years 10 months ago
Multiple-view Video Coding Using Depth Map in Projective Space
Abstract. In this paper a new video coding by using multiple uncalibrated cameras is proposed. We consider the redundancy between the cameras view points and efficiently compress b...
Nina Yorozu, Yuko Uematsu, Hideo Saito
ACMACE
2009
ACM
15 years 10 months ago
An in-game reporting tool for pervasive games
Pervasive and location-based games are played in the real world rather than on the screen of a computer or mobile device. This makes them difficult to study. Since players move ar...
Annika Waern, Zeynep Ahmet, Daniel Sundström
ICCSA
2007
Springer
15 years 10 months ago
Solving a Practical Examination Timetabling Problem: A Case Study
This paper presents a Greedy-Least Saturation Degree (G-LSD) heuristic (which is an adaptation of the least saturation degree heuristic) to solve a real-world examination timetabli...
Masri Ayob, Ariff Md. Ab. Malik, Salwani Abdullah,...
254
Voted
UCS
2007
Springer
15 years 9 months ago
Context Awareness by Case-Based Reasoning in a Music Recommendation System
The recommendation system is one of the core technologies for implementing personalization services. Recommendation systems in ubiquitous computing environment should have the capa...
Jae Sik Lee, Jin Chun Lee
IDEAS
2006
IEEE
109views Database» more  IDEAS 2006»
15 years 9 months ago
Multi-dimensional Histograms with Tight Bounds for the Error
Histograms are being used as non-parametric selectivity estimators for one-dimensional data. For highdimensional data it is common to either compute onedimensional histograms for ...
Linas Baltrunas, Arturas Mazeika, Michael H. B&oum...