Sciweavers

120
Voted
ACNS
2010
Springer
120views Cryptology» more  ACNS 2010»
15 years 8 months ago
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures
Erhan J. Kartaltepe, Jose Andre Morales, Shouhuai ...
CVPR
2010
IEEE
15 years 8 months ago
Large-Scale Image Categorization with Explicit Data Embedding
Kernel machines rely on an implicit mapping of the data such that non-linear classification in the original space corresponds to linear classification in the new space. As kernel ...
Florent Perronnin, Jorge Sanchez, Yan Liu
AAIM
2010
Springer
219views Algorithms» more  AAIM 2010»
15 years 8 months ago
Approximating Maximum Edge 2-Coloring in Simple Graphs
We present a polynomial-time approximation algorithm for legally coloring as many edges of a given simple graph as possible using two colors. It achieves an approximation ratio of...
Zhi-Zhong Chen, Sayuri Konno, Yuki Matsushita
CVPR
2010
IEEE
15 years 8 months ago
Classification and Clustering via Dictionary Learning with Structured Incoherence
A clustering framework within the sparse modeling and dictionary learning setting is introduced in this work. Instead of searching for the set of centroid that best fit the data, ...
Pablo Sprechmann, Ignacio Ramirez, Guillermo Sapir...
162
Voted
CVPR
2010
IEEE
15 years 8 months ago
Bundled Depth-Map Merging for Multi-View Stereo
Depth-map merging is one typical technique category for multi-view stereo (MVS) reconstruction. To guarantee accuracy, existing algorithms usually require either sub-pixel level s...
Jianguo Li