Sciweavers

1096 search results - page 205 / 220
» Computation Slicing: Techniques and Theory
Sort
View
111
Voted
PETRA
2010
ACM
14 years 10 months ago
Integrating RFID on event-based hemispheric imaging for internet of things assistive applications
Automatic surveillance of a scene in a broad sense comprises one of the core modules of pervasive applications. Typically, multiple cameras are installed in an area to identify ev...
Vassilis Kolias, Ioannis Giannoukos, Christos Anag...
MOBIHOC
2010
ACM
14 years 10 months ago
On quality of monitoring for multi-channel wireless infrastructure networks
Passive monitoring utilizing distributed wireless sniffers is an effective technique to monitor activities in wireless infrastructure networks for fault diagnosis, resource manage...
Arun Chhetri, Huy Anh Nguyen, Gabriel Scalosub, Ro...
ICALP
2011
Springer
14 years 3 months ago
New Algorithms for Learning in Presence of Errors
We give new algorithms for a variety of randomly-generated instances of computational problems using a linearization technique that reduces to solving a system of linear equations...
Sanjeev Arora, Rong Ge
124
Voted
ICCV
2011
IEEE
14 years 13 days ago
Learning Universal Multi-view Age Estimator by Video Contexts
Most existing techniques for analyzing face images assume that the faces are at near-frontal poses. Generalizing to non-frontal faces is often difficult, due to a dearth of groun...
Zheng Song, Bingbing Ni, Dong Guo, Terence Sim, Sh...
95
Voted
MOBICOM
2012
ACM
13 years 2 months ago
Argos: practical many-antenna base stations
Multi-user multiple-input multiple-output theory predicts manyfold capacity gains by leveraging many antennas on wireless base stations to serve multiple clients simultaneously th...
Clayton Shepard, Hang Yu, Narendra Anand, Erran Li...