Sciweavers

403 search results - page 66 / 81
» Morphological Change Detection Algorithms for Surveillance A...
Sort
View
BPM
2008
Springer
155views Business» more  BPM 2008»
13 years 9 months ago
The Refined Process Structure Tree
Abstract. We consider workflow graphs as a model for the control flow of a business process model and study the problem of workflow graph parsing, i.e., finding the structure of a ...
Jussi Vanhatalo, Hagen Völzer, Jana Koehler
DCOSS
2008
Springer
13 years 9 months ago
Efficient Node Discovery in Mobile Wireless Sensor Networks
Energy is one of the most crucial aspects in real deployments of mobile sensor networks. As a result of scarce resources, the duration of most real deployments can be limited to ju...
Vladimir Dyo, Cecilia Mascolo
CEAS
2007
Springer
14 years 1 months ago
Hardening Fingerprinting by Context
Near-duplicate detection is not only an important pre and post processing task in Information Retrieval but also an effective spam-detection technique. Among different approache...
Aleksander Kolcz, Abdur Chowdhury
PAMI
2008
172views more  PAMI 2008»
13 years 7 months ago
A Theory Of Frequency Domain Invariants: Spherical Harmonic Identities for BRDF/Lighting Transfer and Image Consistency
This paper develops a theory of frequency domain invariants in computer vision. We derive novel identities using spherical harmonics, which are the angular frequency domain analog ...
Dhruv Mahajan, Ravi Ramamoorthi, Brian Curless
CIKM
2010
Springer
13 years 6 months ago
Context modeling for ranking and tagging bursty features in text streams
Bursty features in text streams are very useful in many text mining applications. Most existing studies detect bursty features based purely on term frequency changes without takin...
Wayne Xin Zhao, Jing Jiang, Jing He, Dongdong Shan...