Sciweavers

7413 search results - page 1451 / 1483
» Using Specularities for Recognition
Sort
View
KDD
2002
ACM
127views Data Mining» more  KDD 2002»
14 years 8 months ago
Mining knowledge-sharing sites for viral marketing
Viral marketing takes advantage of networks of influence among customers to inexpensively achieve large changes in behavior. Our research seeks to put it on a firmer footing by mi...
Matthew Richardson, Pedro Domingos
CHI
2007
ACM
14 years 8 months ago
A study of out-of-turn interaction in menu-based, IVR, voicemail systems
We present the first user study of out-of-turn interaction in menu-based, interactive voice-response systems. Out-ofturn interaction is a technique which empowers the user (unable...
Saverio Perugini, Taylor J. Anderson, William F. M...
SIGMOD
2008
ACM
144views Database» more  SIGMOD 2008»
14 years 8 months ago
Mining significant graph patterns by leap search
With ever-increasing amounts of graph data from disparate sources, there has been a strong need for exploiting significant graph patterns with user-specified objective functions. ...
Xifeng Yan, Hong Cheng, Jiawei Han, Philip S. Yu
MOBISYS
2008
ACM
14 years 7 months ago
Detecting energy-greedy anomalies and mobile malware variants
Mobile users of computation and communication services have been rapidly adopting battery-powered mobile handhelds, such as PocketPCs and SmartPhones, for their work. However, the...
Hahnsang Kim, Joshua Smith, Kang G. Shin
CVPR
2010
IEEE
14 years 4 months ago
Linked Edges as Stable Region Boundaries
Many of the recently popular shape based category recognition methods require stable, connected and labeled edges as input. This paper introduces a novel method to find the most st...
Michael Donoser, Hayko Riemenschneider and Horst B...
« Prev « First page 1451 / 1483 Last » Next »