Sciweavers

15781 search results - page 3067 / 3157
» Evaluating Information Extraction
Sort
View
139
Voted
SPAA
2006
ACM
15 years 9 months ago
Modeling instruction placement on a spatial architecture
In response to current technology scaling trends, architects are developing a new style of processor, known as spatial computers. A spatial computer is composed of hundreds or eve...
Martha Mercaldi, Steven Swanson, Andrew Petersen, ...
108
Voted
UIST
2006
ACM
15 years 9 months ago
Phosphor: explaining transitions in the user interface using afterglow effects
Sometimes users fail to notice a change that just took place on their display. For example, the user may have accidentally deleted an icon or a remote collaborator may have change...
Patrick Baudisch, Desney S. Tan, Maxime Collomb, D...
145
Voted
VEE
2006
ACM
106views Virtualization» more  VEE 2006»
15 years 9 months ago
Using VMM-based sensors to monitor honeypots
Virtual Machine Monitors (VMMs) are a common tool for implementing honeypots. In this paper we examine the implementation of a VMM-based intrusion detection and monitoring system ...
Kurniadi Asrigo, Lionel Litty, David Lie
109
Voted
VRST
2006
ACM
15 years 9 months ago
Hand-held virtual reality: a feasibility study
Hand-held computing devices are ubiquitous and have become part of our lives these days. Moreover, hand-held devices are also increasingly being equipped with special sensors and ...
Jane Hwang, Jaehoon Jung, Gerard Jounghyun Kim
158
Voted
CVPR
2010
IEEE
15 years 9 months ago
Semantic Context Modeling with Maximal Margin Conditional Random Fields for Automatic Image Annotation
Context modeling for Vision Recognition and Automatic Image Annotation (AIA) has attracted increasing attentions in recent years. For various contextual information and resources,...
Yu Xiang, Xiangdong Zhou, Zuotao Liu, Tat-seng chu...
« Prev « First page 3067 / 3157 Last » Next »