Sciweavers

1388 search results - page 132 / 278
» Approximability of Robust Network Design
Sort
View
ICCV
2009
IEEE
6637views Computer Vision» more  ICCV 2009»
16 years 8 months ago
A Markov Clustering Topic Model for Mining Behaviour in Video
This paper addresses the problem of fully automated mining of public space video data. A novel Markov Clustering Topic Model (MCTM) is introduced which builds on existing Dynami...
Timothy Hospedales, Shaogang Gong, Tao Xiang
126
Voted
TCSV
2008
195views more  TCSV 2008»
15 years 3 months ago
Locality Versus Globality: Query-Driven Localized Linear Models for Facial Image Computing
Conventional subspace learning or recent feature extraction methods consider globality as the key criterion to design discriminative algorithms for image classification. We demonst...
Yun Fu, Zhu Li, Junsong Yuan, Ying Wu, Thomas S. H...
120
Voted
WS
2006
ACM
15 years 9 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
127
Voted
DAC
2006
ACM
16 years 4 months ago
Rapid estimation of control delay from high-level specifications
We address the problem of estimating controller delay from high-level specifications during behavioral synthesis. Typically, the critical path of a synthesised behavioral design g...
Gagan Raj Gupta, Madhur Gupta, Preeti Ranjan Panda
ICPADS
2007
IEEE
15 years 9 months ago
A forwarding model for Voronoi-based Overlay Network
One recent approach to build highly scalable and robust networked virtual environments (NVEs) is by using peer-to-peer overlay networks. Voronoi-based Overlay Network (VON) has be...
Jui-Fa Chen, Wei-Chuan Lin, Tsu-Han Chen, Shun-Yun...