Sciweavers

4074 search results - page 679 / 815
» Defining Computational Aesthetics
Sort
View
ECWEB
2010
Springer
179views ECommerce» more  ECWEB 2010»
15 years 1 months ago
Concession Behaviour in Automated Negotiation
Traditional negotiation, conducted face-to-face and via mail or telephone, is often difficult to manage, prone to misunderstanding, and time consuming. Automated negotiation promis...
Fernando Lopes, Helder Coelho
140
Voted
ICDE
2010
IEEE
174views Database» more  ICDE 2010»
15 years 1 months ago
Semantic flooding: Search over semantic links
Abstract-- Classification hierarchies are trees where links codify the fact that a node lower in the hierarchy contains documents whose contents are more specific than those one le...
Fausto Giunchiglia, Uladzimir Kharkevich, Alethia ...
ICIP
2010
IEEE
15 years 1 months ago
RFSIM: A feature based image quality assessment metric using Riesz transforms
Image quality assessment (IQA) aims to provide computational models to measure the image quality in a perceptually consistent manner. In this paper, a novel feature based IQA mode...
Lin Zhang, Lei Zhang, Xuanqin Mou
ICIP
2010
IEEE
15 years 1 months ago
A novel V-line Radon transform and its imaging applications
The Radon transform (RT) on straight lines deals as mathematical foundation for many tomographic modalities (e.g. Xray scanner, Positron Emission Tomography), using only primary r...
Marcela Morvidone, Tuong T. Truong, Mai K. Nguyen,...
IMC
2010
ACM
15 years 1 months ago
Temporally oblivious anomaly detection on large networks using functional peers
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...