Sciweavers

2907 search results - page 521 / 582
» Trust analysis with clustering
Sort
View
CLEF
2008
Springer
14 years 1 days ago
Overview of the ImageCLEFphoto 2008 Photographic Retrieval Task
ImageCLEFphoto 2008 is an ad-hoc photo retrieval task and part of the ImageCLEF evaluation campaign. This task provides both the resources and the framework necessary to perform c...
Thomas Arni, Paul Clough, Mark Sanderson, Michael ...
ASAP
2010
IEEE
143views Hardware» more  ASAP 2010»
13 years 11 months ago
Loop transformations for interface-based hierarchies IN SDF graphs
Data-flow has proven to be an attractive computation model for programming digital signal processing (DSP) applications. A restricted version of data-flow, termed synchronous data...
Jonathan Piat, Shuvra S. Bhattacharyya, Mickaë...
BIOCOMP
2008
13 years 11 months ago
Identifying Protein Flexibility by NMA
- Here proposed apriori method for identification of protein flexibility relies on one end-state conformation of the protein. This method has comparative advantage over many others...
Kresimir Sikic, Branko Jeren, Sanja Tomic
LREC
2010
194views Education» more  LREC 2010»
13 years 11 months ago
Building a Gold Standard for Event Detection in Croatian
This paper describes the process of building a newspaper corpus annotated with events described in specific documents. The main difference to the corpora built as part of the TDT ...
Nikola Ljubesic, Tomislava Lauc, Damir Boras
IADIS
2008
13 years 11 months ago
Web Mining: A Key to Improve Business on Web
This paper takes an overview of the web mining concept and how it can be useful and beneficial to the business improvement by facilitating its applications in various areas over t...
Pradnya Purandare