Sciweavers

1663 search results - page 163 / 333
» Computer Security in the Real World
Sort
View
SOCA
2010
IEEE
15 years 1 months ago
Weighted fuzzy clustering for capability-driven service aggregation
Abstract--Workflow design, mashup configuration, and composite service formation are examples where the capabilities of multiple simple services combined achieve a complex function...
Christoph Dorn, Schahram Dustdar
ICCV
2009
IEEE
15 years 1 months ago
SURF Tracking
Most motion-based tracking algorithms assume that objects undergo rigid motion, which is most likely disobeyed in real world. In this paper, we present a novel motionbased trackin...
Wei He, Takayoshi Yamashita, Hongtao Lu, Shihong L...
COLING
2010
14 years 10 months ago
Open Entity Extraction from Web Search Query Logs
In this paper we propose a completely unsupervised method for open-domain entity extraction and clustering over query logs. The underlying hypothesis is that classes defined by mi...
Alpa Jain, Marco Pennacchiotti
PR
2011
14 years 6 months ago
Generalized darting Monte Carlo
One of the main shortcomings of Markov chain Monte Carlo samplers is their inability to mix between modes of the target distribution. In this paper we show that advance knowledge ...
Cristian Sminchisescu, Max Welling
123
Voted
ECCV
2002
Springer
16 years 5 months ago
Tracking and Object Classification for Automated Surveillance
In this paper we discuss the issues that need to be resolved before fully automated outdoor surveillance systems can be developed, and present solutions to some of these problems. ...
Omar Javed, Mubarak Shah