Sciweavers

9575 search results - page 1803 / 1915
» Exploring user experience in
Sort
View
GLOBECOM
2007
IEEE
14 years 3 months ago
Graph Theoretical Analysis of Opportunistic Scheduling Policy for Wireless Ad Hoc Networks
— 1 Taking advantage of the independent fading channel conditions among multiple wireless users, opportunistic transmissions schedule the user with the instantaneously best condi...
Qing Chen, Fei Ye, Zhisheng Niu
ICASSP
2007
IEEE
14 years 3 months ago
Integrating Relevance Feedback in Boosting for Content-Based Image Retrieval
Many content-based image retrieval applications suffer from small sample set and high dimensionality problems. Relevance feedback is often used to alleviate those problems. In thi...
Jie Yu, Yijuan Lu, Yuning Xu, Nicu Sebe, Qi Tian
IROS
2007
IEEE
210views Robotics» more  IROS 2007»
14 years 3 months ago
Extrinsic self calibration of a camera and a 3D laser range finder from natural scenes
— In this paper, we describe a new approach for the extrinsic calibration of a camera with a 3D laser range finder, that can be done on the fly. This approach does not require an...
Davide Scaramuzza, Ahad Harati, Roland Siegwart
CCS
2007
ACM
14 years 3 months ago
Panorama: capturing system-wide information flow for malware detection and analysis
Malicious programs spy on users’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undes...
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christ...
CIKM
2007
Springer
14 years 3 months ago
Using word similarity to eradicate junk emails
Emails are one of the most commonly used modern communication media these days; however, unsolicited emails obstruct this otherwise fast and convenient technology for information ...
Maria Soledad Pera, Yiu-Kai Ng
« Prev « First page 1803 / 1915 Last » Next »