Sciweavers

661 search results - page 127 / 133
» What Can We Expect from Program Verification
Sort
View
CIVR
2010
Springer
160views Image Analysis» more  CIVR 2010»
14 years 8 days ago
Today's and tomorrow's retrieval practice in the audiovisual archive
Content-based video retrieval is maturing to the point where it can be used in real-world retrieval practices. One such practice is the audiovisual archive, whose users increasing...
Bouke Huurnink, Cees G. M. Snoek, Maarten de Rijke...
CACM
2000
120views more  CACM 2000»
13 years 7 months ago
Universal Usability
ost abstract sense, we build web pages so that computers can read them. The software that people use to access web pages is what "reads" the document. How the page is ren...
Ben Shneiderman
UM
2009
Springer
14 years 2 months ago
PerspectiveSpace: Opinion Modeling with Dimensionality Reduction
Abstract. Words mean different things to different people, and capturing these differences is often a subtle art. These differences are often “a matter of perspective,” and...
Jason B. Alonso, Catherine Havasi, Henry Lieberman
ANOR
2002
99views more  ANOR 2002»
13 years 7 months ago
An Inventory-Location Model: Formulation, Solution Algorithm and Computational Results
We introduce a distribution center (DC) location model that incorporates working inventory and safety stock inventory costs at the distribution centers. In addition, the model inco...
Mark S. Daskin, Collette R. Coullard, Zuo-Jun Max ...
ISAAC
2005
Springer
153views Algorithms» more  ISAAC 2005»
14 years 29 days ago
Network Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...