Sciweavers

17450 search results - page 3488 / 3490
» Numerical Methods with Applications
Sort
View
SIGIR
2012
ACM
11 years 9 months ago
Search, interrupted: understanding and predicting search task continuation
Many important search tasks require multiple search sessions to complete. Tasks such as travel planning, large purchases, or job searches can span hours, days, or even weeks. Inev...
Eugene Agichtein, Ryen W. White, Susan T. Dumais, ...
SODA
2012
ACM
245views Algorithms» more  SODA 2012»
11 years 9 months ago
Lower bounds for number-in-hand multiparty communication complexity, made easy
In this paper we prove lower bounds on randomized multiparty communication complexity, both in the blackboard model (where each message is written on a blackboard for all players ...
Jeff M. Phillips, Elad Verbin, Qin Zhang
CVPR
2012
IEEE
11 years 9 months ago
Laser speckle photography for surface tampering detection
It is often desirable to detect whether a surface has been touched, even when the changes made to that surface are too subtle to see in a pair of before and after images. To addre...
Yi-Chang Shih, Abe Davis, Samuel W. Hasinoff, Fr&e...
CVPR
2012
IEEE
11 years 9 months ago
Multi-attribute spaces: Calibration for attribute fusion and similarity search
Recent work has shown that visual attributes are a powerful approach for applications such as recognition, image description and retrieval. However, fusing multiple attribute scor...
Walter J. Scheirer, Neeraj Kumar, Peter N. Belhume...
ICDCS
2012
IEEE
11 years 9 months ago
NEAT: Road Network Aware Trajectory Clustering
—Mining trajectory data has been gaining significant interest in recent years. However, existing approaches to trajectory clustering are mainly based on density and Euclidean di...
Binh Han, Ling Liu, Edward Omiecinski
« Prev « First page 3488 / 3490 Last » Next »