Sciweavers

1893 search results - page 325 / 379
» Eliciting and Validating Knowledge in Knowledge Management S...
Sort
View
CORR
2010
Springer
177views Education» more  CORR 2010»
13 years 4 months ago
AntiJam: Efficient Medium Access despite Adaptive and Reactive Jamming
Abstract--Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often ...
Andréa W. Richa, Christian Scheideler, Stef...
TMI
2010
217views more  TMI 2010»
13 years 2 months ago
A Generative Model for Image Segmentation Based on Label Fusion
We propose a nonparametric, probabilistic model for the automatic segmentation of medical images, given a training set of images and corresponding label maps. The resulting inferen...
Mert R. Sabuncu, B. T. Thomas Yeo, Koenraad Van Le...
WSDM
2012
ACM
296views Data Mining» more  WSDM 2012»
12 years 3 months ago
Inferring social ties across heterogenous networks
It is well known that different types of social ties have essentially different influence between people. However, users in online social networks rarely categorize their contact...
Jie Tang, Tiancheng Lou, Jon M. Kleinberg
CATA
2001
13 years 9 months ago
Object-oriented image database model
: In this paper we analyze some existing tools and approaches to image data modeling and we propose an Object-Oriented Image Data (OOID) model. It can be applied on a wide variety ...
William I. Grosky, Peter L. Stanchev
DGO
2011
237views Education» more  DGO 2011»
12 years 7 months ago
Modeling digital preservation capabilities in enterprise architecture
The rising awareness of the challenges of preserving information over the long term has led to a wealth of initiatives developing economic models, methods, tools, systems, guideli...
Christoph Becker, Gonçalo Antunes, Jos&eacu...