Sciweavers

1147 search results - page 159 / 230
» Transformation of Access Rights
Sort
View
ICML
2007
IEEE
14 years 11 months ago
On learning with dissimilarity functions
We study the problem of learning a classification task in which only a dissimilarity function of the objects is accessible. That is, data are not represented by feature vectors bu...
Liwei Wang, Cheng Yang, Jufu Feng
WWW
2001
ACM
14 years 11 months ago
XML and XSLT Modeling for Multimedia Bitstream Manipulation
New devices gaining access to the Internet need to obtain multimedia content adapted to their limited capacities. Scalable formats allow to retrieve different versions of a single...
Sylvain Devillers
PODS
2007
ACM
119views Database» more  PODS 2007»
14 years 11 months ago
Reasoning about XML update constraints
XML and semi-structured data are now de-facto standards for data exchange, and it is often the case that published or exchanged XML documents have specic restrictions on how they ...
Bogdan Cautis, Serge Abiteboul, Tova Milo
PERCOM
2007
ACM
14 years 10 months ago
A User Interaction Model for NFC Enabled Applications
Near field communication (NFC) is a short-range wireless protocol that allows users to connect devices and access content and services by simply holding enabled devices near each ...
Yaw Anokwa, Gaetano Borriello, Trevor Pering, Roy ...
DCC
2005
IEEE
14 years 10 months ago
Coding the Wavelet Spatial Orientation Tree with Low Computational Complexity
ct A very fast, low complexity algorithm for resolution scalable and random access decoding is presented. The algorithm is based on AGP (Alphabet and Group Partitioning) [1], where...
Yushin Cho, Amir Said, William A. Pearlman