Sciweavers

6624 search results - page 1312 / 1325
» Design Pattern Recognition
Sort
View
IJCV
2007
155views more  IJCV 2007»
13 years 7 months ago
3D Reconstruction by Shadow Carving: Theory and Practical Evaluation
Abstract. Cast shadows are an informative cue to the shape of objects. They are particularly valuable for discovering object’s concavities which are not available from other cues...
Silvio Savarese, Marco Andreetto, Holly E. Rushmei...
AI
2005
Springer
13 years 7 months ago
Unsupervised named-entity extraction from the Web: An experimental study
The KNOWITALL system aims to automate the tedious process of extracting large collections of facts (e.g., names of scientists or politicians) from the Web in an unsupervised, doma...
Oren Etzioni, Michael J. Cafarella, Doug Downey, A...
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 7 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
TASLP
2008
112views more  TASLP 2008»
13 years 7 months ago
A Study in Efficiency and Modality Usage in Multimodal Form Filling Systems
The usage patterns of speech and visual input modes are investigated as a function of relative input mode efficiency for both desktop and personal digital assistant (PDA) working ...
Manolis Perakakis, Alexandros Potamianos
TC
2008
13 years 7 months ago
Counter-Based Cache Replacement and Bypassing Algorithms
Recent studies have shown that, in highly associative caches, the performance gap between the Least Recently Used (LRU) and the theoretical optimal replacement algorithms is large,...
Mazen Kharbutli, Yan Solihin
« Prev « First page 1312 / 1325 Last » Next »