Sciweavers

723 search results - page 118 / 145
» Exclusion for composite objects
Sort
View
CSCW
2010
ACM
14 years 4 months ago
Reading between the lines: linguistic cues to deception in online dating profiles
This study investigates whether deception in online dating profiles is detectable through a linguistic approach, which assumes that liars nonconsciously produce different word pat...
Catalina L. Toma, Jeffrey T. Hancock
CVPR
2010
IEEE
14 years 3 months ago
Warping Background Subtraction
We present a background model that differentiates between background motion and foreground objects. Unlike most models that represent the variability of pixel intensity at a partic...
Teresa Ko, Stefano Soatto, Deborah Estrin
ICDE
2010
IEEE
249views Database» more  ICDE 2010»
14 years 2 months ago
PARINET: A tunable access method for in-network trajectories
— In this paper we propose PARINET, a new access method to efficiently retrieve the trajectories of objects moving in networks. The structure of PARINET is based on a combination...
Iulian Sandu Popa, Karine Zeitouni, Vincent Oria, ...
HICSS
2009
IEEE
168views Biometrics» more  HICSS 2009»
14 years 2 months ago
Enabling Distributed Model Management Using Semantic Web Technologies
In today’s increasingly dynamic and competitive business environment, organizations strive to leverage their information resources to gain and sustain competitive advantage. Deci...
Amit V. Deokar, Omar F. El-Gayar
IRI
2009
IEEE
14 years 2 months ago
OntoMatch: A Monotonically Improving Schema Matching System for Autonomous Data Integration
Traditional schema matchers use a set of distinct simple matchers and use a composition function to combine the individual scores using an arbitrary order of matcher application l...
Anupam Bhattacharjee, Hasan M. Jamil