Sciweavers

15781 search results - page 3149 / 3157
» Evaluating Information Extraction
Sort
View
RE
2010
Springer
13 years 2 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa
SIGKDD
2010
259views more  SIGKDD 2010»
13 years 2 months ago
Activity recognition using cell phone accelerometers
Mobile devices are becoming increasingly sophisticated and the latest generation of smart cell phones now incorporates many diverse and powerful sensors. These sensors include GPS...
Jennifer R. Kwapisz, Gary M. Weiss, Samuel Moore
TASE
2010
IEEE
13 years 2 months ago
Clear and Precise Specification of Ecological Data Management Processes and Dataset Provenance
Abstract--With the availability of powerful computational and communication systems, scientists now readily access large, complicated derived datasets and build on those results to...
Leon J. Osterweil, Lori A. Clarke, Aaron M. Elliso...
TCSV
2010
13 years 2 months ago
Compressed Domain Video Object Segmentation
We propose a compressed domain video object segmentation method for MPEG or MPEG-like encoded videos. Computational superiority is the main advantage of the compressed domain proc...
Fatih Murat Porikli, Faisal I. Bashir, Huifang Sun
TIP
2010
97views more  TIP 2010»
13 years 2 months ago
Image Clustering Using Local Discriminant Models and Global Integration
In this paper, we propose a new image clustering algorithm, referred to as Clustering using Local Discriminant Models and Global Integration (LDMGI). To deal with the data points s...
Yi Yang, Dong Xu, Feiping Nie, Shuicheng Yan, Yuet...
« Prev « First page 3149 / 3157 Last » Next »