Sciweavers

536 search results - page 84 / 108
» Quality evaluation in information systems outsourcing
Sort
View
ICDM
2005
IEEE
190views Data Mining» more  ICDM 2005»
14 years 2 months ago
Neighborhood Formation and Anomaly Detection in Bipartite Graphs
Many real applications can be modeled using bipartite graphs, such as users vs. files in a P2P system, traders vs. stocks in a financial trading system, conferences vs. authors ...
Jimeng Sun, Huiming Qu, Deepayan Chakrabarti, Chri...
3DPVT
2004
IEEE
316views Visualization» more  3DPVT 2004»
14 years 5 days ago
A Statistical Method for Robust 3D Surface Reconstruction from Sparse Data
Abstract-General information about a class of objects, such as human faces or teeth, can help to solve the otherwise ill-posed problem of reconstructing a complete surface from spa...
Volker Blanz, Albert Mehl, Thomas Vetter, Hans-Pet...
ASSETS
2006
ACM
14 years 4 days ago
Indoor wayfinding: : developing a functional interface for individuals with cognitive impairments
Assistive technology for wayfinding will significantly improve the quality of life for many individuals with cognitive impairments. The user interface of such a system is as cruci...
Alan L. Liu, Harlan Hile, Henry A. Kautz, Gaetano ...
ICDAR
1995
IEEE
13 years 12 months ago
Ground-truthing and benchmarking document page segmentation
We describe a new approach for evaluating page segmentation algorithms. Unlike techniques that rely on OCR output, our method is region-based: the segmentation output, described a...
Berrin A. Yanikoglu, Luc Vincent
USENIX
2007
13 years 10 months ago
Using Provenance to Aid in Personal File Search
As the scope of personal data grows, it becomes increasingly difficult to find what we need when we need it. Desktop search tools provide a potential answer, but most existing too...
Sam Shah, Craig A. N. Soules, Gregory R. Ganger, B...