Sciweavers

38 search results - page 7 / 8
» Visual Recognition and Detection Under Bounded Computational...
Sort
View
WS
2005
ACM
13 years 11 months ago
A framework for MAC protocol misbehavior detection in wireless networks
The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main rea...
Svetlana Radosavac, John S. Baras, Iordanis Koutso...
CVPR
2006
IEEE
14 years 2 days ago
Depth from Familiar Objects: A Hierarchical Model for 3D Scenes
We develop an integrated, probabilistic model for the appearance and three-dimensional geometry of cluttered scenes. Object categories are modeled via distributions over the 3D lo...
Erik B. Sudderth, Antonio B. Torralba, William T. ...
ACL
2010
13 years 4 months ago
Demonstration of a Prototype for a Conversational Companion for Reminiscing about Images
This paper describes an initial prototype demonstrator of a Companion, designed as a platform for novel approaches to the following: 1) The use of Information Extraction (IE) tech...
Yorick Wilks, Roberta Catizone, Alexiei Dingli, We...
AUSDM
2007
Springer
145views Data Mining» more  AUSDM 2007»
14 years 5 days ago
Discovering Frequent Sets from Data Streams with CPU Constraint
Data streams are usually generated in an online fashion characterized by huge volume, rapid unpredictable rates, and fast changing data characteristics. It has been hence recogniz...
Xuan Hong Dang, Wee Keong Ng, Kok-Leong Ong, Vince...
FOSSACS
2005
Springer
13 years 11 months ago
Fault Diagnosis Using Timed Automata
Fault diagnosis consists in observing behaviours of systems, and in detecting online whether an error has occurred or not. In the context of discrete event systems this problem has...
Patricia Bouyer, Fabrice Chevalier, Deepak D'Souza