Sciweavers

1022 search results - page 118 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
CIVR
2010
Springer
227views Image Analysis» more  CIVR 2010»
13 years 6 months ago
Evaluating detection of near duplicate video segments
The automatic detection of near duplicate video segments, such as multiple takes of a scene or different news video clips showing the same event, has received growing research int...
Werner Bailer
MSE
2005
IEEE
148views Hardware» more  MSE 2005»
14 years 2 months ago
Teaching System-Level Design Using SpecC and SystemC
System-level design of embedded computer systems is essential to manage complexity and enhance designer productivity. Viewing designs at t abstraction levels allows developers to ...
Robert D. Walstrom, Joseph Schneider, Diane T. Rov...
PERCOM
2009
ACM
14 years 3 months ago
Towards Privacy-Sensitive Participatory Sensing
—The ubiquity of mobile devices has brought forth the concept of participatory sensing, whereby ordinary citizens can now contribute and share information from the urban environm...
Kuan Lun Huang, Salil S. Kanhere, Wen Hu
IPPS
2005
IEEE
14 years 2 months ago
Distributed Data Streams Indexing using Content-Based Routing Paradigm
In recent years, we have seen a dramatic increase in the use of data-centric distributed systems such as global grid infrastructures, sensor networks, network monitoring, and vari...
Ahmet Bulut, Ambuj K. Singh, Roman Vitenberg
PKDD
2005
Springer
129views Data Mining» more  PKDD 2005»
14 years 2 months ago
Interestingness is Not a Dichotomy: Introducing Softness in Constrained Pattern Mining
Abstract. The paradigm of pattern discovery based on constraints was introduced with the aim of providing to the user a tool to drive the discovery process towards potentially inte...
Stefano Bistarelli, Francesco Bonchi