Sciweavers

2084 search results - page 284 / 417
» Knowledge Exploitation from the Web
Sort
View
CIDR
2009
141views Algorithms» more  CIDR 2009»
13 years 12 months ago
Sailing the Information Ocean with Awareness of Currents: Discovery and Application of Source Dependence
The Web has enabled the availability of a huge amount of useful information, but has also eased the ability to spread false information and rumors across multiple sources, making ...
Laure Berti-Equille, Anish Das Sarma, Xin Dong, Am...
ECCV
2002
Springer
15 years 18 days ago
3D Modelling Using Geometric Constraints: A Parallelepiped Based Approach
In this paper, efficient and generic tools for calibration and 3D reconstruction are presented. These tools exploit geometric constraints frequently present in man-made environmen...
Marta Wilczkowiak, Edmond Boyer, Peter F. Sturm
HICSS
2008
IEEE
106views Biometrics» more  HICSS 2008»
14 years 5 months ago
Rethinking the Digital Divide: Towards a Path of Digital Effectiveness
The digital divide is a complex and dynamic phenomenon. Despite extensive studies on the digital divide and its impact, developing countries, in particular, are still searching fo...
Corlane Barclay, Evan W. Duggan
DSN
2007
IEEE
14 years 5 months ago
Emergent Structure in Unstructured Epidemic Multicast
In epidemic or gossip-based multicast protocols, each node simply relays each message to some random neighbors, such that all destinations receive it at least once with high proba...
Nuno Carvalho, José Pereira, Rui Carlos Oli...
CIG
2006
IEEE
14 years 4 months ago
Capturing The Information Conveyed By Opponents' Betting Behavior in Poker
— This paper develops an approach to the capture and measurement of the information contained in opponents’ bet actions in seven card stud poker. We develop a causal model link...
Eric Saund