Sciweavers

4944 search results - page 762 / 989
» From XML to Relational Models
Sort
View
144
Voted
CVPR
2010
IEEE
16 years 5 days ago
Object-Graphs for Context-Aware Category Discovery
How can knowing about some categories help us to discover new ones in unlabeled images? Unsupervised visual category discovery is useful to mine for recurring objects without huma...
Yong Jae Lee, Kristen Grauman
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 10 months ago
Identity Inference as a Privacy Risk in Computer-Mediated Communication
New Web 2.0 applications, with their emphasis on collaboration and communication, hold the promise of major advances in social connectivity and coordination; however, they also in...
Sara Motahari, Sotirios G. Ziavras, Richard P. Sch...
IEEEARES
2009
IEEE
15 years 10 months ago
Accuracy: The Fundamental Requirement for Voting Systems
—There have been several attempts to develop a comprehensive account of the requirements for voting systems, particularly for public elections. Typically, these approaches identi...
Tim Storer, Russell Lock
115
Voted
WETICE
2009
IEEE
15 years 10 months ago
BitTorrent or BitCrunch: Evidence of a Credit Squeeze in BitTorrent?
Abstract—BitTorrent is a highly popular peer-to-peer filesharing protocol. Much BitTorrent activity takes place within private virtual communities called “Private Trackers” ...
David Hales, Rameez Rahman, Boxun Zhang, Michel Me...
IPPS
2009
IEEE
15 years 10 months ago
The Weak Mutual Exclusion problem
In this paper we define the Weak Mutual Exclusion (WME) problem. Analogously to classical Distributed Mutual Exclusion (DME), WME serializes the accesses to a shared resource. Di...
Paolo Romano, Luís Rodrigues, Nuno Carvalho