Sciweavers

462 search results - page 57 / 93
» Simple Techniques for Complex Web Applications
Sort
View
ICPR
2006
IEEE
14 years 9 months ago
Bagging Based Efficient Kernel Fisher Discriminant Analysis for Face Recognition
Kernel Fisher Discriminant Analysis (KFDA) has achieved great success in pattern recognition recently. However, the training process of KFDA is too time consuming (even intractabl...
Baochang Zhang, Shiguang Shan, Wen Gao, Xilin Chen...
SIGMOD
2009
ACM
157views Database» more  SIGMOD 2009»
14 years 8 months ago
Asynchronous view maintenance for VLSD databases
The query models of the recent generation of very large scale distributed (VLSD) shared-nothing data storage systems, including our own PNUTS and others (e.g. BigTable, Dynamo, Ca...
Parag Agrawal, Adam Silberstein, Brian F. Cooper, ...
SIGDOC
2009
ACM
14 years 2 months ago
Facilita: reading assistance for low-literacy readers
Texts are the media content primarily available on Web sites and applications. However, this heavy use of texts creates an accessibility barrier to those who cannot read fluently...
Willian Massami Watanabe, Arnaldo Candido Junior, ...
NDSS
2003
IEEE
14 years 1 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
VRML
2000
ACM
14 years 5 days ago
The morph node
We discuss potential and limitations of a Morph Node, inspired by the corresponding construct in Java3D. A Morph Node in Java3D interpolates vertex attributes among several homeom...
Marc Alexa, Johannes Behr, Wolfgang Müller 00...