Sciweavers

526 search results - page 100 / 106
» Towards the Verifying Compiler
Sort
View
JCDL
2009
ACM
139views Education» more  JCDL 2009»
14 years 4 months ago
Topic model methods for automatically identifying out-of-scope resources
Recent years have seen the rise of subject-themed digital libraries, such as the NSDL pathways and the Digital Library for Earth System Education (DLESE). These libraries often ne...
Steven Bethard, Soumya Ghosh, James H. Martin, Tam...
MOBICOM
2009
ACM
14 years 4 months ago
Scheduling partition for order optimal capacity in large-scale wireless networks
The capacity scaling property specifies the changes in network throughput when network size increases and serves as an essential performance evaluation metric for large-scale wir...
Yi Xu, Wenye Wang
SACMAT
2009
ACM
14 years 4 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
FGR
2008
IEEE
232views Biometrics» more  FGR 2008»
14 years 4 months ago
3D face recognition from multiple images: A shape-from-motion approach
In this article we explore the use of methodologies for 3D reconstruction from multiple images to recognize faces. We try to devise a strategy to tackle the problem of recognizing...
Manuel Marques, João Costeira
PG
2007
IEEE
14 years 3 months ago
Statistical Hypothesis Testing for Assessing Monte Carlo Estimators: Applications to Image Synthesis
Image synthesis algorithms are commonly compared on the basis of running times and/or perceived quality of the generated images. In the case of Monte Carlo techniques, assessment ...
Kartic Subr, James Arvo