Sciweavers

3905 search results - page 766 / 781
» Teaching Design Patterns
Sort
View
PR
2008
97views more  PR 2008»
13 years 7 months ago
A vision-based method for weeds identification through the Bayesian decision theory
One of the objectives of precision agriculture is to minimize the volume of herbicides that are applied to the fields through the use of site-specific weed management systems. Thi...
Alberto Tellaeche, Xavier P. Burgos-Artizzu, Gonza...
SIGECOM
2008
ACM
130views ECommerce» more  SIGECOM 2008»
13 years 7 months ago
Crowdsourcing and knowledge sharing: strategic user behavior on taskcn
Witkeys are a thriving type of web-based knowledge sharing market in China, supporting a form of crowdsourcing. In a Witkey site, users offer a small award for a solution to a tas...
Jiang Yang, Lada A. Adamic, Mark S. Ackerman
IJCV
2007
155views more  IJCV 2007»
13 years 7 months ago
3D Reconstruction by Shadow Carving: Theory and Practical Evaluation
Abstract. Cast shadows are an informative cue to the shape of objects. They are particularly valuable for discovering object’s concavities which are not available from other cues...
Silvio Savarese, Marco Andreetto, Holly E. Rushmei...
AI
2005
Springer
13 years 7 months ago
Unsupervised named-entity extraction from the Web: An experimental study
The KNOWITALL system aims to automate the tedious process of extracting large collections of facts (e.g., names of scientists or politicians) from the Web in an unsupervised, doma...
Oren Etzioni, Michael J. Cafarella, Doug Downey, A...
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 7 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang