758,268 research outputs found

    Intrinsic Dimensionality

    Full text link
    This entry for the SIGSPATIAL Special July 2010 issue on Similarity Searching in Metric Spaces discusses the notion of intrinsic dimensionality of data in the context of similarity search.Comment: 4 pages, 4 figures, latex; diagram (c) has been correcte

    Write While You Search: Ambient Searching of a Digital Library in the Context of Writing

    Get PDF
    We consider ideas for a tighter integration of searching a digital library while writing a paper. A prototype system based on web services is described which allows us to explore the design space of ambient search tools to support and inspire the writing process.published or submitted for publicationis peer reviewe

    On the sigma-model structure of type IIA supergravity action in doubled field approach

    Full text link
    In this letter we describe how to string together the doubled field approach by Cremmer, Julia, Lu and Pope with Pasti-Sorokin-Tonin technique to construct the sigma-model-like action for type IIA supergravity. The relation of the results with that of obtained in the context of searching for Superstring/M-theory hidden symmetry group is discussed.Comment: 9 pp, LATEX; published in JETP Let

    Context-aware person identification in personal photo collections

    Get PDF
    Identifying the people in photos is an important need for users of photo management systems. We present MediAssist, one such system which facilitates browsing, searching and semi-automatic annotation of personal photos, using analysis of both image content and the context in which the photo is captured. This semi-automatic annotation includes annotation of the identity of people in photos. In this paper, we focus on such person annotation, and propose person identiïŹcation techniques based on a combination of context and content. We propose language modelling and nearest neighbor approaches to context-based person identiïŹcation, in addition to novel face color and image color content-based features (used alongside face recognition and body patch features). We conduct a comprehensive empirical study of these techniques using the real private photo collections of a number of users, and show that combining context- and content-based analysis improves performance over content or context alone

    Heuristic Methods for Security Protocols

    Full text link
    Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security property-dependent heuristic. The heuristic weights the state space by exploiting the security formulae; the weights may then be used to explore the state space when searching for attacks

    TIP spatial index: efficient access to digital libraries in a context-aware mobile system

    Get PDF
    We present a framework for efficient, uniform, location-based access to digital library collections that are external to a context-aware mobile information system. Using a tourist Information system, we utilize a spatial index to manage the context of location. We show how access to resources from within and outside of the tourist information system can be carried out in a seamless manner. We show how the spatial index can be navigated to continually provide information to the user. An empirical evaluation of the navigation strategy versus traditional spatial searching shows that navigation is efficient and outperforms traditional spatial search. In conclusion, our work provides a strategy for context-aware mobile systems to co-operate with digital libraries in a seamless and efficient manner
    • 

    corecore