• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 31,497
Next 10 →

Table 1. Visual Keywords for soccer video Keywords Abbreviatio

in Soccer Video Event Detection with Visual Keywords
by Yu-lin Kang, Joo-hwee Lim, Qi Tian, Mohan S. Kankanhalli 2003
"... In PAGE 2: ... 2.1 Visual Keywords for Soccer Video We define a basic set of visual keywords for soccer video event detection as listed in Table1 . Initially we also included some visual keywords like referee, coach and goalkeeper in our vocabulary.... ..."
Cited by 4

Table 1: Components of Information Visualization

in Document Explorer Visualizations of WWW Document and Term Spaces
by Richard H. Fowler, Wendy A. L. Fowler, Jorge L. Williams

Table 3.Object Keywords

in Reverse-engineering of Individual and Inter-Personal Work Practices: A Context-based Approach
by Marielba Zacarias, H. Sofia Pinto, José Tribolet
"... In PAGE 12: ... Ex- tracted noun phrases were analyzed and those referring to informational items, tools or people were selected as keywords. Table3 depicts some noun phrases and their fre- quency. Table 3.... ..."

Table 3.Object Keywords

in Copyright c ○ 2007
by Anders Kofod-petersen, Jörg Cassens, David B. Leake, Stefan Schulz, Anders Kofod-petersen, Jörg Cassens, David B. Leake, Jörg Cassens, David B. Leake, Stefan Schulz
"... In PAGE 54: ... 3. Table3 . Examples for questions to the CKB.... In PAGE 94: ... Extracted noun phrases were analyzed and identifying nested actions, informational items, tools or people were selected as keywords. Table3 depicts some noun phrases and their fre- quency. Actions were clustered according to action type and object keywords.... ..."

Table 1 Keyword combinations used to retrieve papers for the three knowledge domains

in unknown title
by unknown authors
"... In PAGE 4: ... The concepts of resilience, vulnerability and adaptation have developed over time, and have been used in various ways, often unrelated to the study on HDGEC. Relevant papers that did not use the keywords given in Table1 or did not cite the seeds listed in Table 2 were not retrieved. In sum, while we aimed for the best and most complete set of relevant publications, we might have missed important contributions.... ..."

Table 1: Task support by the three information visualization

in Evaluating Three-Dimensional Information Visualization Designs: a Case Study of Three Designs
by Ulrika Wiss , David Carr, et al. 1998
"... In PAGE 7: ... It is then up to the application to implement the tasks. Table1 summa- rizes how the three information visualization designs support implementing these tasks. This evaluation shows that the way a certain in- formation visualization design visualizes information may make it impossible to support a certain task.... ..."
Cited by 15

Table 2. Representation of information in Visual Watermark 1

in A hybrid scheme for encryption and watermarking
by Xiaowei Xu, A Scott Dexter B, Ahmet M. Eskicioglu B
"... In PAGE 5: ... The length and binary representation of each piece of information (time, date, content, etc.) is included in Table2 . As there is no industry standard, the binary values are arbitrarily chosen to guarantee uniqueness in each field.... ..."

Table 1: Information Visualization Pipeline stages

in Expressiveness of the Data Flow and Data State Models in Visualization Systems
by Ed H. Chi

TABLE I RESOLUTION OF VISUAL FIELD INFORMATION. Information Contents Resolution

in Developmental Construction of Intentional Agency in Communicative Eye Gaze
by Takeshi Konno
Cited by 1

Table 2 Some weak keys that cause leaking of visual information. Weak keys Visual information leaked from

in On the security defects of an image encryption scheme
by Chengqing Li , Shujun Li , Muhammad Asim , Juana Nunez , Gonzalo Alvarez , Guanrong Chen 1990
Cited by 1
Next 10 →
Results 1 - 10 of 31,497
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University