Sciweavers

2340 search results - page 397 / 468
» Data abstraction and information hiding
Sort
View
SLSFS
2005
Springer
14 years 1 months ago
Incorporating Constraints and Prior Knowledge into Factorization Algorithms - An Application to 3D Recovery
Abstract. Matrix factorization is a fundamental building block in many computer vision and machine learning algorithms. In this work we focus on the problem of ”structure from mo...
Amit Gruber, Yair Weiss
WAC
2005
Springer
123views Communications» more  WAC 2005»
14 years 1 months ago
Service Evolution in a Nomadic Wireless Environment
Abstract. In this paper, we present and analyze a framework for selfevolving autonomic services in a wireless nomadic environment. We present a disconnected network architecture, w...
Iacopo Carreras, Francesco De Pellegrini, Daniele ...
CSCW
2004
ACM
14 years 1 months ago
Controlling interruptions: awareness displays and social motivation for coordination
Spontaneous communication is common in the workplace but can be disruptive. Such communication usually benefits the initiator more than the target of an interruption. Previous res...
Laura A. Dabbish, Robert E. Kraut
CIT
2004
Springer
14 years 1 months ago
FPGA Based Implementation of an Invisible-Robust Image Watermarking Encoder
Abstract. Both encryption and digital watermarking techniques need to be incorporated in a digital rights management framework to address different aspects of content management. W...
Saraju P. Mohanty, Renuka Kumara C., Sridhara Naya...
ER
2004
Springer
179views Database» more  ER 2004»
14 years 1 months ago
XSLTGen: A System for Automatically Generating XML Transformations via Semantic Mappings
Abstract. XML is rapidly emerging as a dominant standard for representing and exchanging information. The ability to transform and present data in XML is crucial and XSLT is a rela...
Stella Waworuntu, James Bailey