Sciweavers

234 search results - page 25 / 47
» Algorithmic Power from Declarative Use of Redundant Constrai...
Sort
View
113
Voted
JMLR
2008
100views more  JMLR 2008»
15 years 12 days ago
Hit Miss Networks with Applications to Instance Selection
In supervised learning, a training set consisting of labeled instances is used by a learning algorithm for generating a model (classifier) that is subsequently employed for decidi...
Elena Marchiori
90
Voted
MOBICOM
2010
ACM
15 years 19 days ago
Intentional networking: opportunistic exploitation of mobile network diversity
Mobile devices face a diverse and dynamic set of networking options. Using those options to the fullest requires knowledge of application intent. This paper describes Intentional ...
Brett D. Higgins, Azarias Reda, Timur Alperovich, ...
HICSS
2002
IEEE
89views Biometrics» more  HICSS 2002»
15 years 5 months ago
Nash Strategies for Load Serving Entities in Dynamic Energy Multi-markets
In this paper the problem of developing bidding strategies for the participants of dynamic energy-multi markets is studied. Attention is given to strategic bidding of load serving...
Jose B. Cruz Jr., Ashkan Kian
91
Voted
MOBICOM
2009
ACM
15 years 5 months ago
Understanding cross-band interference in unsynchronized spectrum access
We consider the problem of cross-band interference when devices from the same or different networks share radio spectrum. Cross-band interference occurs when unsynchronized trans...
Wei Hou, Lei Yang, Lin Zhang, Xiuming Shan, Heathe...
117
Voted
ACCV
2009
Springer
15 years 7 months ago
A Probabilistic Model for Correspondence Problems Using Random Walks with Restart
Abstract. In this paper, we propose an efficient method for finding consistent correspondences between two sets of features. Our matching algorithm augments the discriminative pow...
Tae Hoon Kim, Kyoung Mu Lee, Sang Uk Lee