Sciweavers

2121 search results - page 358 / 425
» Experimental Analysis of BRDF Models
Sort
View
SIGIR
2003
ACM
14 years 1 months ago
Structured use of external knowledge for event-based open domain question answering
One of the major problems in question answering (QA) is that the queries are either too brief or often do not contain most relevant terms in the target corpus. In order to overcom...
Hui Yang, Tat-Seng Chua, Shuguang Wang, Chun-Keat ...
CCS
2003
ACM
14 years 29 days ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu
ICIAP
2003
ACM
14 years 29 days ago
Multi-block PCA method for image change detection
Principal component analyses (PCA) has been widely used in reduction of the dimensionality of datasets, classification, feature extraction, etc. It has been combined with many oth...
B. Qiu, Véronique Prinet, Edith Perrier, Ol...
ICMI
2003
Springer
164views Biometrics» more  ICMI 2003»
14 years 29 days ago
A visually grounded natural language interface for reference to spatial scenes
Many user interfaces, from graphic design programs to navigation aids in cars, share a virtual space with the user. Such applications are often ideal candidates for speech interfa...
Peter Gorniak, Deb Roy
INFOCOM
2002
IEEE
14 years 20 days ago
SWAN: Service Differentiation in Stateless Wireless Ad Hoc Networks
—We propose SWAN, a stateless network model which uses distributed control algorithms to deliver service differentiation in mobile wireless ad hoc networks in a simple, scalable ...
Gahng-Seop Ahn, Li-Hsiang Sun, Andras Veres, Andre...