Sciweavers

271 search results - page 32 / 55
» From Trust to Dependability through Risk Analysis
Sort
View
CIVR
2007
Springer
112views Image Analysis» more  CIVR 2007»
14 years 1 months ago
Canonical image selection from the web
The vast majority of the features used in today’s commercially deployed image search systems employ techniques that are largely indistinguishable from text-document search – t...
Yushi Jing, Shumeet Baluja, Henry A. Rowley
DIAGRAMS
2006
Springer
13 years 9 months ago
From Diagrams to Models by Analogical Transfer
Abstract. We present a method for constructing a teleological model of a drawing of a physical device through analogical transfer of the teleological model of the same device in an...
Patrick W. Yaner, Ashok K. Goel
WINE
2005
Springer
109views Economy» more  WINE 2005»
14 years 1 months ago
New Algorithms for Mining the Reputation of Participants of Online Auctions
The assessment of credibility and reputation of contractors in online auctions is the key issue in providing reliable environment for customer-to-customer e-commerce. Confident re...
Mikolaj Morzy
OSDI
2006
ACM
14 years 8 months ago
Operating System Profiling via Latency Analysis
Operating systems are complex and their behavior depends on many factors. Source code, if available, does not directly help one to understand the OS's behavior, as the behavi...
Nikolai Joukov, Avishay Traeger, Rakesh Iyer, Char...
ICIP
2006
IEEE
14 years 9 months ago
Extraction of Significant Video Summaries by Dendrogram Analysis
In the current video analysis scenario, effective clustering of shots facilitates the access to the content and helps in understanding the associated semantics. This paper introdu...
Sergio Benini, Aldo Bianchetti, Riccardo Leonardi,...