Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMarch 2010
Modeling POMDPs for generating and simulating stock investment policies
SAC '10: Proceedings of the 2010 ACM Symposium on Applied ComputingPages 2394–2399https://doi.org/10.1145/1774088.1774585Analysts and investors use Technical Analysis tools to create charts and price indicators that help them in decision making. Chart patterns and indicators are not deterministic and even analysts may have different interpretations, depending on their ...
- research-articleMarch 2010
A two stage yard crane workload partitioning and job sequencing algorithm for container terminals
SAC '10: Proceedings of the 2010 ACM Symposium on Applied ComputingPages 2383–2388https://doi.org/10.1145/1774088.1774583We propose a new YC workload partitioning scheme which employs dynamic data driven simulations to conduct what-if experiments in container terminals. Both the optimal partition of the workload in a row of yard blocks and the optimal dispatching ...
-
- research-articleMarch 2010
Constraint processing in relational database systems: from theory to implementation
SAC '10: Proceedings of the 2010 ACM Symposium on Applied ComputingPages 2066–2070https://doi.org/10.1145/1774088.1774522Constraint satisfaction problems (CSP) are frequently solved over data residing in relational database systems. In such scenarios, the database is typically just used as a data storage back end. However, there exist important advantages, such as the ...
- research-articleMarch 2010
Probabilistic constraints for reliability problems
SAC '10: Proceedings of the 2010 ACM Symposium on Applied ComputingPages 2055–2060https://doi.org/10.1145/1774088.1774520Reliability quantifies the ability of a system to perform its required function under stated conditions. The reliability of a decision is usually represented as the probability of an adequate functioning of the system where both the decision and ...
- research-articleMarch 2010
Coordination in open and dynamic environments with TuCSoN semantic tuple centres
SAC '10: Proceedings of the 2010 ACM Symposium on Applied ComputingPages 2037–2044https://doi.org/10.1145/1774088.1774515With the goal of addressing open and dynamic scenarios like the Web, in this paper we introduce a semantic-oriented extension of the tuple space model. In our model, each tuple space is equipped with the ontological description of the coordination ...
- research-articleMarch 2010
Agent-based coordination for the sensor web
SAC '10: Proceedings of the 2010 ACM Symposium on Applied ComputingPages 2019–2023https://doi.org/10.1145/1774088.1774512This paper addresses the problem of coordination within the Sensor Web, where the Sensor Web is defined as an amorphous network of spatially distributed nodes that sense various phenomena in the environment, that are battery powered, and that ...
- research-articleMarch 2010
Subjective video quality assessment applied to scalable video coding and transmission instability
SAC '10: Proceedings of the 2010 ACM Symposium on Applied ComputingPages 1898–1904https://doi.org/10.1145/1774088.1774491This paper presents a study of subjective quality of scalable video sequences, coded using the scalable extension of the H.264 standard (SVC). A group of experiments was performed to measure, primarily, the effects that the transmission instability has ...
- research-articleMarch 2010
PHOTOLAND: a new image layout system using spatio-temporal information in digital photos
SAC '10: Proceedings of the 2010 ACM Symposium on Applied ComputingPages 1884–1891https://doi.org/10.1145/1774088.1774489This paper describes PHOTOLAND, a system that visualizes hundreds of photos on a 2D grid space to help users manage their photos. It closely places similar photos in the grid based on temporal and spatial information. Most photograph management systems ...
- research-articleMarch 2010
Filtering spams using the minimum description length principle
SAC '10: Proceedings of the 2010 ACM Symposium on Applied ComputingPages 1854–1858https://doi.org/10.1145/1774088.1774481Spam has become an increasingly important problem with a big economic impact in society. Spam filtering poses a special problem in text categorization, of which the defining characteristic is that filters face an active adversary, which constantly ...
- research-articleMarch 2010
Probabilistic anti-spam filtering with dimensionality reduction
SAC '10: Proceedings of the 2010 ACM Symposium on Applied ComputingPages 1802–1806https://doi.org/10.1145/1774088.1774469One of the biggest problems of e-mail communication is the massive spam message delivery. Everyday, billion of unwanted messages are sent by spammers and this number does not stop growing. Helpfully, there are different approaches able to automatically ...
- research-articleMarch 2010
Classification of violent web images using context based analysis
SAC '10: Proceedings of the 2010 ACM Symposium on Applied ComputingPages 1768–1773https://doi.org/10.1145/1774088.1774464The development of the Web has been paralleled by the proliferation of a harmful content on its pages. Using Violent Web images as a case study, we tend to present a novel approach to their classification. This subject is of high importance as it has a ...
- research-articleMarch 2010
Query systems in similarity-based databases: logical foundations, expressive power, and completeness
SAC '10: Proceedings of the 2010 ACM Symposium on Applied ComputingPages 1648–1655https://doi.org/10.1145/1774088.1774444This paper presents logical foundations for an extension of Codd's relational model of data which aims at utilizing various aspects of similarity in data processing. A need for development of solid foundations for such extensions, sometimes called ...
- posterMarch 2010
Filtering the shadows from poorly illuminated photos
SAC '10: Proceedings of the 2010 ACM Symposium on Applied ComputingPages 1599–1600https://doi.org/10.1145/1774088.1774430This paper presents a new algorithm for filtering shadowy photos degraded by uneven light condition. The dark photos are harder to use for face recognition or even an analysis of the scene. Corrections can be made using commercial tools as Photoshop™ ...
- research-articleMarch 2010
The 'Dresden Image Database' for benchmarking digital image forensics
SAC '10: Proceedings of the 2010 ACM Symposium on Applied ComputingPages 1584–1590https://doi.org/10.1145/1774088.1774427This paper introduces and documents a novel image database specifically built for the purpose of development and bench-marking of camera-based digital forensic techniques. More than 14,000 images of various indoor and outdoor scenes have been acquired ...
- research-articleMarch 2010
Personal identification using periocular skin texture
SAC '10: Proceedings of the 2010 ACM Symposium on Applied ComputingPages 1496–1500https://doi.org/10.1145/1774088.1774408In this paper, we propose the use of periocular skin texture as a biometric modality. Salient skin texture features are extracted and represented using Local Binary Patterns (LBPs). Matching is performed using CityBlock distance as a measure of ...
- research-articleMarch 2010
A discriminated correlation classifier for face recognition
SAC '10: Proceedings of the 2010 ACM Symposium on Applied ComputingPages 1485–1490https://doi.org/10.1145/1774088.1774406In this paper, a discriminated correlation classifier is proposed to improve the performance of the two-dimensional (2-D) face recognition algorithm. Until now, many methods have been proposed to address the problems encountered by face recognition ...
- research-articleMarch 2010
Experimental study on the impact of robust watermarking on iris recognition accuracy
SAC '10: Proceedings of the 2010 ACM Symposium on Applied ComputingPages 1479–1484https://doi.org/10.1145/1774088.1774405Watermarking has been suggested as a means to improve security of biometric systems or to add additional functionalities to such systems. We experimentally investigate the impact of applying a set of blind robust watermarking schemes on the recognition ...