Sciweavers

154 search results - page 30 / 31
» Applying an Update Method to a Set of Receivers
Sort
View
ICANNGA
2007
Springer
191views Algorithms» more  ICANNGA 2007»
13 years 11 months ago
Novel Multi-layer Non-negative Tensor Factorization with Sparsity Constraints
In this paper we present a new method of 3D non-negative tensor factorization (NTF) that is robust in the presence of noise and has many potential applications, including multi-way...
Andrzej Cichocki, Rafal Zdunek, Seungjin Choi, Rob...
MIR
2005
ACM
198views Multimedia» more  MIR 2005»
13 years 11 months ago
Semi-automatic video annotation based on active learning with multiple complementary predictors
In this paper, we will propose a novel semi-automatic annotation scheme for video semantic classification. It is well known that the large gap between high-level semantics and low...
Yan Song, Xian-Sheng Hua, Li-Rong Dai, Meng Wang
ICDE
2011
IEEE
281views Database» more  ICDE 2011»
12 years 9 months ago
Declarative analysis of noisy information networks
—There is a growing interest in methods for analyzing data describing networks of all types, including information, biological, physical, and social networks. Typically the data ...
Walaa Eldin Moustafa, Galileo Namata, Amol Deshpan...
DIGRA
2003
Springer
13 years 10 months ago
Supporting visual elements of non-verbal communication in computer game avatars
Communication between players in networked computer games is often inadequately implemented. The games do not exploit the full potential of using different forms of communication ...
Tomi Kujanpää, Tony Manninen
CSREASAM
2003
13 years 6 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas