Sciweavers

12438 search results - page 2413 / 2488
» The Magic of a Number System
Sort
View
ICDCS
2010
IEEE
13 years 10 months ago
Opportunistic Routing for Interactive Traffic in Wireless Networks
Abstract--To take advantage of the broadcast nature of wireless communication, a number of opportunistic routing techniques have recently been proposed. In order to manage the extr...
Tianji Li, Douglas J. Leith, Lili Qiu
PASTE
2010
ACM
13 years 10 months ago
Null dereference analysis in practice
Many analysis techniques have been proposed to determine when a potentially null value may be dereferenced. But we have observed in practice that not every potential null derefere...
Nathaniel Ayewah, William Pugh
CIVR
2008
Springer
221views Image Analysis» more  CIVR 2008»
13 years 10 months ago
Annotation suggestion and search for personal multimedia objects on the web
The number of personal multimedia objects, such as digital photographs and videos, are exploding on the web through popular sites such as Flickr, YouTube, and FaceBook hosting bil...
Brendan Elliott, Z. Meral Özsoyoglu
CIVR
2008
Springer
166views Image Analysis» more  CIVR 2008»
13 years 10 months ago
A probabilistic ranking framework using unobservable binary events for video search
Recent content-based video retrieval systems combine output of concept detectors (also known as high-level features) with text obtained through automatic speech recognition. This ...
Robin Aly, Djoerd Hiemstra, Arjen P. de Vries, Fra...
CLUSTER
2008
IEEE
13 years 10 months ago
Variable-grain and dynamic work generation for Minimal Unique Itemset mining
Abstract--SUDA2 is a recursive search algorithm for Minimal Unique Itemset detection. Such sets of items are formed via combinations of non-obvious attributes enabling individual r...
Paraskevas Yiapanis, David J. Haglin, Anna M. Mann...
« Prev « First page 2413 / 2488 Last » Next »