Filters








178 Hits in 7.0 sec

All the right descriptors: A test of the strategy of unlimited aliasing

Terrence A. Brooks
1993 Journal of the American Society for Information Science  
The Strategy of Unlimited Aliasing failed this crucial test. Parsimonious explanations of other tests did not favor the Strategy of Unlimited Aliasing.  ...  This article reports an experiment using descriptors to test the robustness of the Strategy of Unlimited Aliasing.  ... 
doi:10.1002/(sici)1097-4571(199304)44:3<137::aid-asi3>3.0.co;2-# fatcat:sg7cvgtr6rfwlotv6lk5tccgre

All the right words: Finding what you want as a function of richness of indexing vocabulary

Louis M. Gomez, Carol C. Lochbaum, Thomas K. Landauer
1990 Journal of the American Society for Information Science  
The implications of index-word selection strategies for user success in interactive searching were investigated in two experiments.  ...  People were asked to find target information objects using a simple interactive keyword information retrieval system in which the number of referent terms assigned to each object was systematically varied  ...  As an alternative to the "right" name strategy, Fumas et al. suggested the "unlimited aliasing" technique, where each object is given as many names as people will assign it.  ... 
doi:10.1002/(sici)1097-4571(199012)41:8<547::aid-asi1>3.0.co;2-p fatcat:trgobmrir5c3rhleqrbochxtpq

Page 31 of Library & Information Science Abstracts Vol. , Issue 5 [page]

1993 Library & Information Science Abstracts  
(ZH) 13.13 INDEXING 9303112 All the right descriptors: a test of the Strategy of Unlimited Aliasing. T. A. Brooks.  ...  The study tested the Strategy of Unlimited Aliasing, an indexing method that places the alternative terms suggested by several indexers for the same information object into one index.  ... 

Sampling Strategies for Bag-of-Features Image Classification [chapter]

Eric Nowak, Frédéric Jurie, Bill Triggs
2006 Lecture Notes in Computer Science  
, and using the resulting distribution of samples in descriptor space as a characterization of the image.  ...  The basic idea is to treat images as loose collections of independent patches, sampling a representative set of patches from the image, evaluating a visual descriptor vector for each patch independently  ...  The performance of descriptor extraction at fine scales is critical for the former, as these contain most of the discriminative detail but also most of the aliasing and 'noise'.  ... 
doi:10.1007/11744085_38 fatcat:x3f2fhsrpbdufab33qaxcpsl3m

Benchmarking Strategy for Arabic Screen-Rendered Word Recognition [chapter]

Fouad Slimane, Slim Kanoun, Jean Hennebert, Rolf Ingold, Adel M. Alimi
2012 Guide to OCR for Arabic Scripts  
This chapter presents a new benchmarking strategy for Arabic screenbased word recognition. Firstly, we report on the creation of the new APTI (Arabic Printed Text Image) database.  ...  A focus is also given on low resolution images where anti-aliasing is generating noise on the characters being recognized.  ...  and suggestions, which have much improved the presentation of this work.  ... 
doi:10.1007/978-1-4471-4072-6_18 fatcat:zzzsq2vlurfpxlvdcjekrjeo2y

الویب 2.0 : دراسة تحلیلیة للإنتاج العلمى المتاح على الخط المباشر

ریهام عاصم جابر غنیم
2013 بحوث فی علم المکتبات والمعلومات  
v ia=ihub[ 29/1/2012] 15 ) Brooks, TA (1993) All the right descriptors: A test of the strategy of unlimited aliasing. Journal of the American Society for Information Science.-vol. 44, no(3).  ...  -Bibliometrics of the World Wide Web: An Exploratory Analysis of the Intellectual Structure of Cyberspace.-University of California, Berkeley Berkeley, CA 94720-4600.  ... 
doi:10.21608/sjrc.2013.84613 fatcat:3sp2nuvfyvgdpon2ngihel7dk4

Standards for data acquisition and software-based analysis of in vivo electroencephalography recordings from animals. A TASK1-WG5 report of the AES/ILAE Translational Task Force of the ILAE

Jason T. Moyer, Vadym Gnatkovsky, Tomonori Ono, Jakub Otáhal, Joost Wagenaar, William C. Stacey, Jeffrey Noebels, Akio Ikeda, Kevin Staley, Marco de Curtis, Brian Litt, Aristea S. Galanopoulou
2017 Epilepsia  
We thank the members of the Author Manuscript This article is protected by copyright. All rights reserved  ...  Acknowledgements This manuscript is a product of the working group 5 of the TASK1 of the AES/ILAE Translational Research Task Force of the ILAE.  ...  All rights reserved Commonly this type of information is stored in a header, or block of data placed at the beginning of a data file.  ... 
doi:10.1111/epi.13909 pmid:29105070 fatcat:vffzc3apfrdsrocdvcefcgfx4u

General Place Recognition Survey: Towards the Real-world Autonomy Age [article]

Peng Yin, Shiqi Zhao, Ivan Cisneros, Abulikemu Abuduweili, Guoquan Huang, Micheal Milford, Changliu Liu, Howie Choset, Sebastian Scherer
2022 arXiv   pre-print
Additionally, there is a lack of an integrated framework amongst the state-of-the-art methods that can handle all of the challenges in place recognition, which include appearance changes, viewpoint differences  ...  A summary of this work and our datasets and evaluation API is publicly available to the robotics community at: https://github.com/MetaSLAM/GPRS.  ...  Finally, even considering all the above approaches, developing a robust place recognition method can handle the unbounded combinations of environmental conditions and unlimited scenarios in the real-world  ... 
arXiv:2209.04497v1 fatcat:24lgwrfvyrbaflx2tnehc6xvhy

A software flaw taxonomy

Sam Weber, Paul A. Karger, Amit Paradkar
2005 Proceedings of the 2005 workshop on Software engineering for secure systems---building trustworthy applications - SESS '05  
In order to target their technology on a rational basis, it would be useful for tool-builders to have available a taxonomy of software security flaws organizing the problem space.  ...  Unfortunately, the only existing suitable taxonomies are sadly out-of-date, and do not adequately represent security flaws that are found in modern software.  ...  However, all ring 0 segments had a second entry in the descriptor segment that was left over from the 645 design that allowed unlimited access.  ... 
doi:10.1145/1083200.1083209 dblp:conf/icse/WeberKP05 fatcat:lwxsq6fftvajlfacophghdewbe

A software flaw taxonomy

Sam Weber, Paul A. Karger, Amit Paradkar
2005 Software engineering notes  
In order to target their technology on a rational basis, it would be useful for tool-builders to have available a taxonomy of software security flaws organizing the problem space.  ...  Unfortunately, the only existing suitable taxonomies are sadly out-of-date, and do not adequately represent security flaws that are found in modern software.  ...  However, all ring 0 segments had a second entry in the descriptor segment that was left over from the 645 design that allowed unlimited access.  ... 
doi:10.1145/1082983.1083209 fatcat:pbgjriaj3rgdbj6zy4kifxrxbe

Extracting moving shapes by evidence gathering

Michael G. Grant, Mark S. Nixon, Paul H. Lewis
2002 Pattern Recognition  
Furthermore, the complexity of the motion template model remains unchanged with increase in the complexity of motion, whereas a parametric model would require increasingly more parameters leading to an  ...  A further advantage is reduction in computational demand, as seen in use of templates for shape extraction.  ...  The cost of this approach is that the method loses the (debatable) exibility of ÿnding all descriptions of all possible shapes in a scene.  ... 
doi:10.1016/s0031-3203(01)00078-4 fatcat:opgazhhyszc5liq3xlhzr45wvi

Structure-based ASCII art

Xuemiao Xu, Linling Zhang, Tien-Tsin Wong
2010 ACM SIGGRAPH 2010 papers on - SIGGRAPH '10  
Representing the unlimited image content with the extremely limited shapes and restrictive placement of characters makes this problem challenging.  ...  It approximates the major line structure of the reference image content with the shape of characters.  ...  Acknowledgments This project is supported by the Research Grants Council of the Hong Kong Special Administrative Region, under General Research Fund (CUHK417107).  ... 
doi:10.1145/1833349.1778789 fatcat:k3rdfbhyf5cerhiertmbbxbaaa

Structure-based ASCII art

Xuemiao Xu, Linling Zhang, Tien-Tsin Wong
2010 ACM Transactions on Graphics  
Representing the unlimited image content with the extremely limited shapes and restrictive placement of characters makes this problem challenging.  ...  It approximates the major line structure of the reference image content with the shape of characters.  ...  Acknowledgments This project is supported by the Research Grants Council of the Hong Kong Special Administrative Region, under General Research Fund (CUHK417107).  ... 
doi:10.1145/1833351.1778789 fatcat:7adbkmnjxbcwveklbjrycriiuq

Structure-based ASCII art

Xuemiao Xu, Linling Zhang, Tien-Tsin Wong
2010 ACM Transactions on Graphics  
Representing the unlimited image content with the extremely limited shapes and restrictive placement of characters makes this problem challenging.  ...  It approximates the major line structure of the reference image content with the shape of characters.  ...  Acknowledgments This project is supported by the Research Grants Council of the Hong Kong Special Administrative Region, under General Research Fund (CUHK417107).  ... 
doi:10.1145/1778765.1778789 fatcat:zsecftlm2jha3nekkbjunjzcki

A concept space approach to addressing the vocabulary problem in scientific information retrieval: An experiment on the Worm Community System

Hsinchun Chen, Tobun D. Ng, Joanne Martinez, Bruce R. Schatz
1997 Journal of the American Society for Information Science  
Based on a cognitive study of term association involving four biologists, we found that a large percentage (59.6-85.6"A ) of the terms suggested by the subjects were identified in the conjoined fly-worm  ...  However, we found only a small parentage (6.4-18.1 %) of the associations suggested by the subjects in the thesaurus.  ...  We also would like to express our special thanks to Pauline Cochrane, Ann Bishop, and the referees for their valuable comments on an early draft of the paper.  ... 
doi:10.1002/(sici)1097-4571(199701)48:1<17::aid-asi4>3.0.co;2-4 fatcat:y76g7bjeavablo5ampi3d6u2hi
« Previous Showing results 1 — 15 out of 178 results