Sciweavers

15033 search results - page 2923 / 3007
» Complexity Theory and Algorithms
Sort
View
166
Voted
VTC
2007
IEEE
149views Communications» more  VTC 2007»
15 years 10 months ago
An Iterative Detection Aided Irregular Convolutional Coded Wavelet Videophone Scheme Using Reversible Variable-Length Codes and
— In this paper, we characterize the achievable performance of a wavelet encoding-based videophone system, which further compresses and protects the wavelet-based video codec’s...
Anh Quang Pham, Jin Wang, Lie-Liang Yang, Lajos Ha...
164
Voted
AIIA
2007
Springer
15 years 10 months ago
A Hierarchical Clustering Procedure for Semantically Annotated Resources
Abstract. A clustering method is presented which can be applied to relational knowledge bases. It can be used to discover interesting groupings of resources through their (semantic...
Nicola Fanizzi, Claudia d'Amato, Floriana Esposito
143
Voted
ASIACRYPT
2007
Springer
15 years 10 months ago
When e-th Roots Become Easier Than Factoring
We show that computing e-th roots modulo n is easier than factoring n with currently known methods, given subexponential access to an oracle outputting the roots of numbers of the ...
Antoine Joux, David Naccache, Emmanuel Thomé...
150
Voted
ATAL
2007
Springer
15 years 10 months ago
Conditional random fields for activity recognition
Activity recognition is a key component for creating intelligent, multi-agent systems. Intrinsically, activity recognition is a temporal classification problem. In this paper, we...
Douglas L. Vail, Manuela M. Veloso, John D. Laffer...
152
Voted
AUSDM
2007
Springer
173views Data Mining» more  AUSDM 2007»
15 years 10 months ago
The Use of Various Data Mining and Feature Selection Methods in the Analysis of a Population Survey Dataset
This paper reports the results of feature reduction in the analysis of a population based dataset for which there were no specific target variables. All attributes were assessed a...
Ellen Pitt, Richi Nayak
« Prev « First page 2923 / 3007 Last » Next »