Sciweavers

8655 search results - page 1191 / 1731
» Challenges for Trusted Computing
Sort
View
ADHOCNETS
2010
Springer
15 years 3 months ago
Event Detection in Wireless Sensor Networks - Can Fuzzy Values Be Accurate?
Event detection is a central component in numerous wireless sensor network (WSN) applications. In spite of this, the area of event description has not received enough attention. Th...
Krasimira Kapitanova, Sang Hyuk Son, Kyoung-Don Ka...
BIRTHDAY
2010
Springer
15 years 3 months ago
Designing Benchmarks for P2P Systems
In this paper we discuss requirements for peer-to-peer (P2P) benchmarking, and we present two exemplary approaches to benchmarks for Distributed Hashtables (DHT) and P2P gaming ove...
Max Lehn, Tonio Triebel, Christian Gross, Dominik ...
BMVC
2010
15 years 3 months ago
Improving object classification using semantic attributes
This paper shows how semantic attribute features can be used to improve object classification performance. The semantic attributes used fall into five groups: scene (e.g. `road�...
Yu Su, Moray Allan, Frédéric Jurie
BMVC
2010
15 years 3 months ago
High Five: Recognising human interactions in TV shows
In this paper we address the problem of recognising interactions between two people in realistic scenarios for video retrieval purposes. We develop a per-person descriptor that us...
Alonso Patron, Marcin Marszalek, Andrew Zisserman,...
BMVC
2010
15 years 3 months ago
Generalized RBF feature maps for Efficient Detection
Kernel methods yield state-of-the-art performance in certain applications such as image classification and object detection. However, large scale problems require machine learning...
Sreekanth Vempati, Andrea Vedaldi, Andrew Zisserma...
« Prev « First page 1191 / 1731 Last » Next »