Sciweavers

2169 search results - page 329 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
CIVR
2007
Springer
155views Image Analysis» more  CIVR 2007»
15 years 10 months ago
Detection of near-duplicate images for web search
Among the vast numbers of images on the web are many duplicates and near-duplicates, that is, variants derived from the same original image. Such near-duplicates appear in many we...
Jun Jie Foo, Justin Zobel, Ranjan Sinha, Seyed M. ...
WWW
2007
ACM
16 years 5 months ago
Altering document term vectors for classification: ontologies as expectations of co-occurrence
In this paper we extend the state-of-the-art in utilizing background knowledge for supervised classification by exploiting the semantic relationships between terms explicated in O...
Meenakshi Nagarajan, Amit P. Sheth, Marcos Kawazoe...
TEI
2010
ACM
132views Hardware» more  TEI 2010»
15 years 11 months ago
Interactions around a contextually embedded system
This paper discusses observations of visitor interactions around a museum installation, focusing on how physical setup and shape of two variants of the installation, a telescope-l...
Eva Hornecker
ICIP
2008
IEEE
15 years 11 months ago
Extending connected operators to colour images
Connected operators are an important tool for the analysis of greyscale images. In extending them to colour and other vector images there are a number of issues that must be addre...
Adrian N. Evans, David Gimenez
FCCM
2007
IEEE
146views VLSI» more  FCCM 2007»
15 years 11 months ago
Mitrion-C Application Development on SGI Altix 350/RC100
This paper provides an evaluation of SGI® RASC™ RC100 technology from a computational science software developer’s perspective. A brute force implementation of a two-point an...
Volodymyr V. Kindratenko, Robert J. Brunner, Adam ...