Sciweavers

2105 search results - page 133 / 421
» Grouping with Directed Relationships
Sort
View
CISIS
2009
IEEE
14 years 5 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
ICDAR
2009
IEEE
14 years 4 months ago
Text Localization in Natural Scene Images Based on Conditional Random Field
This paper proposes a novel hybrid method to robustly and accurately localize texts in natural scene images. A text region detector is designed to generate a text confidence map,...
Yi-Feng Pan, Xinwen Hou, Cheng-Lin Liu
WECWIS
2009
IEEE
168views ECommerce» more  WECWIS 2009»
14 years 4 months ago
SARI-SQL: Event Query Language for Event Analysis
Complex Event Processing (CEP) systems are capable of processing large amounts of events, utilizing them to monitor, steer and optimize business in real time. The lack of tracking...
Szabolcs Rozsnyai, Josef Schiefer, Heinz Roth
HICSS
2008
IEEE
106views Biometrics» more  HICSS 2008»
14 years 4 months ago
An Empirical Investigation of the Roles of Outcome Controls and Psychological Factors in Collaboration Technology Supported Virt
The purpose of this research is to examine whether outcome controls of group work (i.e. time pressure and reward) trigger psychological factors (i.e. distraction, motivation, and ...
Fang He, Souren Paul
HICSS
2008
IEEE
107views Biometrics» more  HICSS 2008»
14 years 4 months ago
Does Knowledge Management Pay Off?
The resource-based theory of the firm attributes superior firm performance to organizational resources that are valuable, rare, irreplaceable, and not readily reproduced. Aligned ...
Clyde W. Holsapple, Jiming Wu