Search For:

Displaying 1-50 out of 249 total
A Web-Based Tool for the Visual Analysis of Media Annotations
Found in: 2014 18th International Conference on Information Visualisation (IV)
By Pierrick Bruneau,Mickael Stefas,Herve Bredin,Anh-Phuong Ta,Thomas Tamisier,Claude Barras
Issue Date:July 2014
pp. 145-150
Multimedia annotation algorithms infer localized metadata in multimedia content, e.g. Speakers' voices or subjects' faces. There is a growing need of experts from this domain to perform advanced analyses, that go beyond medium-scale quality metrics. This p...
 
Platform Calibration for Load Balancing of Large Simulations: TLM Case
Found in: 2014 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid)
By Cristian Ruiz,Mihai Alexandru,Olivier Richard,Thierry Monteil,Herve Aubert
Issue Date:May 2014
pp. 465-472
The heterogeneous nature of distributed platforms such as computational Grids is one of the main barriers to effectively deploy tightly-coupled applications. For those applications, one common problem that appears due to the hardware heterogeneity is the l...
 
Annotation-Based Access Control Approach for Ubiquitous Systems
Found in: 2014 IEEE 28th International Conference on Advanced Information Networking and Applications (AINA)
By Rhoney Benigno,Natan Pedrosa,Pedro Tome,Wesley Araujo,Jose R. Torres Neto,Eucassio Junior,Savio Mota,Jose B. Filho,Herve Martin
Issue Date:May 2014
pp. 218-225
With the growing production and access of resources managed by sensor-rich ubiquitous devices, such as photos, videos, and services, critical issues arise from access control point of view. Sensor-rich devices offer users new opportunities for creating, ac...
 
Cloudlets Authentication in NFC-Based Mobile Computing
Found in: 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)
By Samia Bouzefrane,Amira F. Benkara Mostefa,Fatiha Houacine,Herve Cagnon
Issue Date:April 2014
pp. 267-272
The availability of NFC capabilities on smartphones has facilitated the development of a large number of related applications. Some of these applications may be resource-intensive tasks, and Cloudlets-based mobile computing are a good candidate to offload ...
 
Structured Sparsity Models for Reverberant Speech Separation
Found in: IEEE/ACM Transactions on Audio, Speech and Language Processing (TASLP)
By Afsaneh Asaei, Herve Bourlard, Mohammad Golbabaee, Volkan Cevher
Issue Date:March 2014
pp. 620-633
We tackle the speech separation problem through modeling the acoustics of the reverberant chambers. Our approach exploits structured sparsity models to perform speech recovery and room acoustic modeling from recordings of concurrent unknown sources. The sp...
     
A feature-rich NoC switch with cross-feature optimizations for the next generation of reliable and reconfigurable embedded systems
Found in: Proceedings of the 8th International Workshop on Interconnection Network Architecture: On-Chip, Multi-Chip (INA-OCMC '14)
By Alberto Ghiribaldi, Alessandro Strano, Davide Bertozzi, Herve Tatenguem Fankem
Issue Date:January 2014
pp. 1-4
The digital design convergence, together with the new usage models of mobile devices, are raising the clear need for new requirements such as flexible partitioning, runtime adaptivity, reliability. In turn, such feature-rich architectures make the testing ...
     
Mobile Photo Recommendation and Logbook Generation Using Context-Tagged Images
Found in: IEEE MultiMedia
By Windson Viana,Reinaldo Braga,Fabricio D.A. Lemos,Joao M.O. de Souza,Rafael A.F Carmo,Rossana M.C. Andrade,Herve Martin
Issue Date:January 2014
pp. 24-34
Context-aware and semantic-based technologies have been successfully employed to improve multimedia management in mobile environments. Large sets of context-tagged images on the Web are a concrete example of this achievement. The authors present two mobile...
 
The Substitution Principle in an Object-Oriented Framework for Web Services: From Failure to Success
Found in: Proceedings of International Conference on Information Integration and Web-based Applications & Services (IIWAS '13)
By Diana Allam, Hervé Grall, Jean-Claude Royer
Issue Date:December 2013
pp. 250-259
Nowadays, services are more and more implemented by using object-oriented frameworks. In this context, two properties could be particularly required in the specification of these frameworks: (i) a loose coupling between the service layer and the object lay...
     
Stable Hyper-pooling and Query Expansion for Event Detection
Found in: 2013 IEEE International Conference on Computer Vision (ICCV)
By Matthijs Douze,Jerome Revaud,Cordelia Schmid,Herve Jegou
Issue Date:December 2013
pp. 1825-1832
This paper makes two complementary contributions to event retrieval in large collections of videos. First, we propose hyper-pooling strategies that encode the frame descriptors into a representation of the video sequence in a stable manner. Our best choice...
 
Query-Adaptive Asymmetrical Dissimilarities for Visual Object Retrieval
Found in: 2013 IEEE International Conference on Computer Vision (ICCV)
By Cai-Zhi Zhu,Herve Jegou,Shin'Ichi Satoh
Issue Date:December 2013
pp. 1705-1712
Visual object retrieval aims at retrieving, from a collection of images, all those in which a given query object appears. It is inherently asymmetric: the query object is mostly included in the database image, while the converse is not necessarily true. Ho...
 
To Aggregate or Not to aggregate: Selective Match Kernels for Image Search
Found in: 2013 IEEE International Conference on Computer Vision (ICCV)
By Giorgos Tolias,Yannis Avrithis,Herve Jegou
Issue Date:December 2013
pp. 1401-1408
This paper considers a family of metrics to compare images based on their local descriptors. It encompasses the VLAD descriptor and matching techniques such as Hamming Embedding. Making the bridge between these approaches leads us to propose a match kernel...
 
Psychometric study of a questionnaire for the assessment of factors associated with the choice of degrees and universities in the Spanish public system
Found in: Proceedings of the First International Conference on Technological Ecosystem for Enhancing Multiculturality (TEEM '13)
By Antonio Hervás, Joan Guàrdia i Olmos, Maribel Peró, Pedro Pablo Soriano, Roberto Capilla
Issue Date:November 2013
pp. 267-275
Many different factors are taken into account by students when choosing a degree and University. Some of these are general considerations, such as the quality of the degree course, ratio of available places and places in the degree course chosen as first c...
     
Trust assurance levels of cybercars in v2x communication
Found in: Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles (CyCAR '13)
By Alexander Kiening, Herve Seudie, Marko Wolf, Daniel Angermeier, Tyrone Stodart
Issue Date:November 2013
pp. 49-60
In the last decade, the automotive industry, governments and researchers have invested a lot of effort setting up the basis for vehicle to vehicle and vehicle to infrastructure (V2X) communication with the aim of improving road safety and traffic efficienc...
     
CyCAR'2013: first international academic workshop on security, privacy and dependability for cybervehicles
Found in: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (CCS '13)
By Ahmad-Reza Sadeghi, Arslan Munir, Farinaz Koushanfar, Hervé Seudié
Issue Date:November 2013
pp. 1481-1482
The next generation of automobiles (also known as CyberVehicles) will increasingly incorporate electronic control units in novel automotive control applications. Recent work has demonstrated vulnerability of modern automotive control systems to security at...
     
WSN-inspired sleep protocols for heterogeneous LTE networks
Found in: Proceedings of the 10th ACM symposium on Performance evaluation of wireless ad hoc, sensor, & ubiquitous networks (PE-WASUN '13)
By Fabrice Valois, Hervé Rivano, Iulia Tunaru
Issue Date:November 2013
pp. 113-120
The tremendous increase of the traffic demand in cellular networks imposes a massive densification of the traditional cellular infrastructure. The network architecture becomes heterogenous, in particular 4G networks where LTE micro eNodeBs are deployed to ...
     
A Meta-model and Ontology for Managing Heterogenous Alignment Resources
Found in: 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)
By Nizar Ghoula,Herve Nindanga,Gilles Falquet
Issue Date:November 2013
pp. 167-170
Since the invention of the Semantic Web concept, the number of ontological and terminological resources on the Web has been increasing. These heterogeneous resources may share entities or contain similar ones. To cope with the diversity of these resources ...
 
OTMedia: the French TransMedia news observatory
Found in: Proceedings of the 21st ACM international conference on Multimedia (MM '13)
By Agnès Saulnier, Jérôme Thièvre, Julien Champ, Marie-Luce Viaud, Nicolas Hervé, Olivier Buisson, Alexis Joly, Pierre Letessier
Issue Date:October 2013
pp. 441-442
Who said What, Where and How? How are images, video and stories spreading out? Who produces the information? OTMedia addresses these questions by collecting, enriching and analysing continuously more than 1500 streams of French media from TV Radio, Web, AF...
     
Pl@ntNet mobile app
Found in: Proceedings of the 21st ACM international conference on Multimedia (MM '13)
By Aurélien Péronnet, Daniel Barthélémy, Hervé Goëau, Itheri Yahiaoui, Jennifer Carré, Julien Barbe, Pierre Bonnet, Souheil Selmi, Vera Bakić, Alexis Joly, Grégoire Duché, Jean-François Molino, Nozha Boujemaa
Issue Date:October 2013
pp. 423-424
Pl@ntNet is an image sharing and retrieval application for the identification of plants, available on iPhone and iPad devices. Contrary to previous content-based identification applications it can work with several parts of the plant including flowers, lea...
     
Small objects query suggestion in a large web-image collection
Found in: Proceedings of the 21st ACM international conference on Multimedia (MM '13)
By Amel Hamzaoui, Alexis Joly, Buisson Olivier, Julien Champ, Nicolas Hervé, Pierre Letessier
Issue Date:October 2013
pp. 417-418
State-of-the-art visual search methods allow retrieving efficiently small rigid objects in very large image datasets (e.g. logos, paintings, etc.). User's perception of the classical query-by-window paradigm is however affected by the fact that many submit...
     
Orcc: multimedia development made easy
Found in: Proceedings of the 21st ACM international conference on Multimedia (MM '13)
By Herve Yviquel, Alexandre Sanchez, Antoine Lorence, Gildas Cocherel, Khaled Jerbi, Mickael Raulet
Issue Date:October 2013
pp. 863-866
In this paper, we present Orcc, an open-source development environment that aims at enhancing multimedia development by offering all the advantages of dataflow programming: flexibility, portability and scalability. To do so, Orcc embeds two rich eclipse-ba...
     
Revisiting the VLAD image representation
Found in: Proceedings of the 21st ACM international conference on Multimedia (MM '13)
By Patrick Pérez, Philippe-Henri Gosselin, Hervé Jégou, Jonathan Delhumeau
Issue Date:October 2013
pp. 653-656
Recent works on image retrieval have proposed to index images by compact representations encoding powerful local descriptors, such as the closely related VLAD and Fisher vector. By combining such a representation with a suitable coding technique, it is pos...
     
Sim-min-hash: an efficient matching technique for linking large image collections
Found in: Proceedings of the 21st ACM international conference on Multimedia (MM '13)
By Wan-Lei Zhao, Guillaume Gravier, Hervé Jégou
Issue Date:October 2013
pp. 577-580
One of the most successful method to link all similar images within a large collection is min-Hash, which is a way to significantly speed-up the comparison of images when the underlying image representation is bag-of-words. However, the quantization step o...
     
Parsifal: Writing efficient and robust binary parsers, quickly
Found in: 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS)
By Olivier Levillain,Herve Debar,Benjamin Morin
Issue Date:October 2013
pp. 1-6
For our needs, we wrote several parsers to analyse a lot of SSL/TLS data. As the collected messages were sometimes corrupted or invalid, standard tools did not allow for sound and robust dissection. Parsifal, an OCaml-based parsing engine, allowed us to ga...
   
Exception handlers for healing component-based systems
Found in: ACM Transactions on Software Engineering and Methodology (TOSEM)
By Hervé Chang, Leonardo Mariani, Mauro Pezzè
Issue Date:October 2013
pp. 1-40
To design effective exception handlers, developers must predict at design time the exceptional events that may occur at runtime, and must implement the corresponding handlers on the basis of their predictions. Designing exception handlers for component-bas...
     
The imageCLEF plant identification task 2013
Found in: Proceedings of the 2nd ACM international workshop on Multimedia analysis for ecological data (MAED '13)
By Alexis Joly, Daniel Barthélémy, Hervé Goëau, Jean-François Molino, Nozha Boujemaa, Pierre Bonnet, Vera Bakic
Issue Date:October 2013
pp. 23-28
This paper presents a synthesis of ImageCLEF 2013 plant identification task, a system-oriented testbed dedicated to the evaluation of image-based plant identification technologies. With 12 participating groups coming from over 9 countries and 33 submitted ...
     
Investigating the Impact of Language Style and Vocal Expression on Social Roles of Participants in Professional Meetings
Found in: 2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)
By Ashtosh Sapru,Herve Bourlard
Issue Date:September 2013
pp. 324-329
This paper investigates the influence of social roles on the language style and vocal expression patterns of participants in professional meeting recordings. Language style features are extracted from automatically generated speech transcripts and characte...
 
A Delay-Tolerant Network Routing Algorithm Based on Column Generation
Found in: 2013 IEEE 12th International Symposium on Network Computing and Applications (NCA)
By Guilherme Amantea,Herve Rivano,Alfredo Goldman
Issue Date:August 2013
pp. 89-96
Delay-Tolerant Networks (DTN) model systems that are characterized by intermittent connectivity and frequent partitioning. Routing in DTNs has drawn much research effort recently. Since very different kinds of networks fall in the DTN category, many routin...
 
Attribute-Based Mining Process for the Organization-Based Access Control Model
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Ahmad Samer Wazan,Gregory Blanc,Herve Debar,Joaquin Garcia-Alfaro
Issue Date:July 2013
pp. 421-430
Since the late 60's, different security access control models have been proposed. Their rationale is to conceive high level abstract concepts that permit to manage the security policies of organizations efficiently. However, enforcing these models is not a...
 
A Mathematical Look to the World
Found in: 2013 17th International Conference on Information Visualisation
By Herve Lehning
Issue Date:July 2013
pp. 366-371
When using visualisations to explore mathematics, I was seduced by their aesthetics. It led me to see them as a form of art and to start to produce mathematical visualisations just for the sake of it. I began to study the interactions between mathematics a...
 
Loss calibrated methods for bipartite rationing: bipartite rationing
Found in: Proceedings of the fourteenth ACM conference on Electronic commerce (EC '13)
By Herve Moulin, Jay Sethuraman
Issue Date:June 2013
pp. 697-714
The standard problem of rationing a single over-demanded commodity has a natural bipartite extension with multiple types of a one-dimensional commodity (e.g., stored in different locations), and each agent can only consume some types of the commodity (e.g....
     
Better Exploiting Motion for Better Action Recognition
Found in: 2013 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Mihir Jain,Herve Jegou,Patrick Bouthemy
Issue Date:June 2013
pp. 2555-2562
Several recent works on action recognition have attested the importance of explicitly integrating motion characteristics in the video description. This paper establishes that adequately decomposing visual motion into dominant and residual motions, both in ...
 
Event Retrieval in Large Video Collections with Circulant Temporal Encoding
Found in: 2013 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Jerome Revaud,Matthijs Douze,Cordelia Schmid,Herve Jegou
Issue Date:June 2013
pp. 2459-2466
This paper presents an approach for large-scale event retrieval. Given a video clip of a specific event, eg, the wedding of Prince William and Kate Middleton, the goal is to retrieve other videos representing the same event from a dataset of over 100k vide...
 
Testing or Formal Verification: DO-178C Alternatives and Industrial Experience
Found in: IEEE Software
By Yannick Moy,Emmanuel Ledinot,Herve Delseny,Virginie Wiels,Benjamin Monate
Issue Date:May 2013
pp. 50-57
Software for commercial aircraft is subject to the stringent certification processes described in the DO-178B standard, "Software Considerations in Airborne Systems and Equipment Certification." Issued in 1992, this document focuses strongly on t...
 
Reduced code linearity testing of pipeline adcs in the presence of noise
Found in: 2013 IEEE 31st VLSI Test Symposium (VTS)
By Asma Laraba,Haralampos-G. Stratigopoulos,Salvador Mir,Herve Naudet,Gerard Bret
Issue Date:April 2013
pp. 1-6
Reduced code testing of a pipeline analog-to-digital converter (ADC) consists of inferring the complete static transfer function by measuring the width of a small subset of codes. This technique exploits the redundancy that is present in the way the ADC pr...
 
One year of SSL internet measurement
Found in: Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC '12)
By Arnaud Ébalard, Benjamin Morin, Hervé Debar, Olivier Levillain
Issue Date:December 2012
pp. 11-20
Over the years, SSL/TLS has become an essential part of internet security. As such, it should offer robust and state-of-the-art security, in particular for HTTPS, its first application. Theoretically, the protocol allows for a trade-off between secure algo...
     
Capillary networks: a novel networking paradigm for urban environments
Found in: Proceedings of the first workshop on Urban networking (UrbaNe '12)
By Fabrice Valois, Hervé Rivano, Isabelle Augé-Blum, Khaled Boussetta, Razvan Stanica
Issue Date:December 2012
pp. 25-30
In this paper, we present our vision of the networking challenges that are yielded by the rise of Smart Cities. Smart Cities leverage massive data collected by sensors, connected devices, social applications,... for proving a whole set a new services to th...
     
A multi-layer data representation of trajectories in social networks based on points of interest
Found in: Proceedings of the twelfth international workshop on Web information and data management (WIDM '12)
By Ali Tahir, Hervé Martin, Michela Bertolotto, Reinaldo Bezerra Braga
Issue Date:November 2012
pp. 19-26
Social networking, and sophisticated wireless and positioning systems are fast developing and ever increasing technologies. Mobile social applications have the ability to increase the social connectivity by capturing automatically users' daily routines wit...
     
Low pin count DfT technique for RFID ICs
Found in: 2012 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)
By Marcelo de Souza Moraes,Marcos Barcellos Herve,Marcelo Soares Lubaszewski
Issue Date:October 2012
pp. 31-36
The need of uniquely identifiable objects for multiple applications has given great attention to RFID ICs over the years. The test challenges imposed by the nature of this type of IC include small die size, reduced number of external pins, low power mixed-...
 
OntoVIP: An Ontology for the Annotation of Object Models Used for Medical Image Simulation
Found in: 2012 IEEE Second International Conference on Healthcare Informatics, Imaging and Systems Biology (HISB)
By Bernard Gibaud,Germain Forestier,Hugues Benoit-Cattin,Frederic Cervenansky,Patrick Clarysse,Denis Friboulet,Alban Gaignard,Patrick Hugonnard,Carole Lartizien,Herve Liebgott,Johan Montagnat,Joachim Tabary,Tristan Glatard
Issue Date:September 2012
pp. 110
This paper describes works carried out in the Virtual Imaging Platform (VIP) project to create a comprehensive conceptualization of object models used in medical image simulation and suitable for the major imaging modalities and simulators. The goal is to ...
 
Towards an Adaptable Middleware for Parallel Computing in Heterogeneous Environments
Found in: 2012 IEEE International Conference on Cluster Computing Workshops and Posters (CLUSTER WORKSHOPS)
By Joao Saramago,Diogo Mourao,Herve Paulino
Issue Date:September 2012
pp. 143-151
The adoption of the multi-core processor design has spawned a wide variety of CPU configurations, namely in the number and nature of the hosted cores. The cluster organization of such CPUs is particularly sensitive to this issue, since applications must be...
 
iCARE: A Scenario-Based Method for the RIBS Project
Found in: 2012 European Intelligence and Security Informatics Conference (EISIC)
By Herve Borrion,Noemie Bouhana
Issue Date:August 2012
pp. 284
Systems engineering requires a good understanding of user needs. For security systems, the potentially large number of threats and the diverse conditions that a product may experience can create practical challenges for those in charge of developing system...
 
Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics
Found in: 2012 European Intelligence and Security Informatics Conference (EISIC)
By Herve Borrion,Timothy Mitchener-Nissen,Jonathon Taylor,Ka-Man Lai
Issue Date:August 2012
pp. 68-75
This article examines some of the ethical issues that engineers face in developing bio-protection systems for smart buildings. An innovative approach based on four different containment strategies is used to identify these issues. Subsequent analysis shows...
 
Checkpoint oriented cell-cycle simulation: critical role for age distribution initialization
Found in: Proceedings of the fourteenth international conference on Genetic and evolutionary computation conference companion (GECCO Companion '12)
By Bernard Ducommun, Hervé Luga, Jonathan Pascalie, Valérie Lobjois, Yves Duthen
Issue Date:July 2012
pp. 1425-1426
In this paper we start to validate a computational cell cycle model, developed in a collaborative work between computer scientists and biologists, evaluating the convergence between in-vitro and in-silico results. Whereas most models are phase-orientated o...
     
A hybrid metaheuristic algorithm for flexible job-shop scheduling problems with transportation constraints
Found in: Proceedings of the fourteenth international conference on Genetic and evolutionary computation conference (GECCO '12)
By Hervé Manier, Marie-Ange Manier, Qiao Zhang
Issue Date:July 2012
pp. 441-448
In this paper, we aim at solving flexible job shop scheduling problems with transportation constraints and bounded processing times. We propose a hybrid method of genetic algorithm, tabu local search and a modified shifting bottleneck procedure. The geneti...
     
An Institutional Personal Learning Environment Enabler
Found in: 2012 IEEE 12th International Conference on Advanced Learning Technologies (ICALT)
By Laurent Moccozet,Omar Benkacem,Pierre-Yves Burgi,Herve Platteaux,Denis Gillet
Issue Date:July 2012
pp. 51-52
In this paper, we first discuss the concept of Personal Learning Environment (PLE) with respect to higher-education institutions and Virtual Learning Environments (VLEs). This discussion rapidly confronts us to the place of the PLE and self-directed learni...
 
Combining the setbase approach with negative databases
Found in: 2012 Tenth Annual International Conference on Privacy, Security and Trust (PST)
By Julien Bringer,Herve Chabanne,Olivier Cipiere
Issue Date:July 2012
pp. 233-234
In 2009, Shamir proposed the setbase approach to protect the privacy of biometric data during ID documents issuance. One year later, Bringer and Chabanne introduced negative databases for biometric data. In this paper, we show that negative database techni...
 
Single Operation Multiple Data - Data Parallelism at Subroutine Level
Found in: 2012 IEEE 14th Int'l Conf. on High Performance Computing and Communication (HPCC) & 2012 IEEE 9th Int'l Conf. on Embedded Software and Systems (ICESS)
By Eduardo Marques,Herve Paulino
Issue Date:June 2012
pp. 254-261
The parallel nature of the multi-core architectural design can only be fully exploited by concurrent applications. This status quo pushed productivity to the forefront of the language design concerns. The community is demanding for new solutions in the des...
 
A Predictive Approach for a Real-Time Remote Visualization of Large Meshes
Found in: Advanced Computing & Communication Technologies, International Conference on
By Justin-Hervé Noubissi,Christophe Guillet,Jean-Luc Martinez
Issue Date:January 2012
pp. 282-288
Remote access to large meshes is the subject of studies since several years. We propose in this paper a contribution to the problem of remote mesh viewing. We work on triangular meshes. After a study of existing methods of remote viewing, we propose a visu...
 
A trajectory correlation algorithm based on users' daily routines
Found in: Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (GIS '11)
By Herve Martin, Medeiros da Costa, Reinaldo Bezerra Braga, Socrates de Moraes
Issue Date:November 2011
pp. 501-504
In recent years, there has been a change in society behavior regarding the way people interact with each other. Particularly, there is a tendency for people to change from real to virtual communities. Consequently, social opportunities are frequently misse...
     
Visual-based plant species identification from crowdsourced data
Found in: Proceedings of the 19th ACM international conference on Multimedia (MM '11)
By Alexis Joly, Daniel Bathelemy, Elise Mouysset, Herve Goeau, Jean-Francois Molino, Laurent Joyeux, Nozha Boujemaa, Philippe Birnbaum, Pierre Bonnet, Souheil Selmi
Issue Date:November 2011
pp. 813-814
This demo presents a crowdsourcing web application dedicated to the access of botanical knowledge through automated identification of plant species by visual content. Inspired by citizen sciences, our aim is to speed up the collection and integration of ra...
     
 1  2 Next >>