Sciweavers

5948 search results - page 117 / 1190
» Computing Robust Counter-Strategies
Sort
View
JCC
2002
74views more  JCC 2002»
14 years 9 months ago
Improved RGF method to find saddle points
: The predictor-corrector method for following a reduced gradient (RGF) to determine saddle points [Quapp, W. et al., J Comput Chem 1998, 19, 1087] is further accelerated by a modi...
Michael Hirsch, Wolfgang Quapp
CVPR
2010
IEEE
14 years 7 months ago
Growing semantically meaningful models for visual SLAM
Though modern Visual Simultaneous Localisation and Mapping (vSLAM) systems are capable of localising robustly and efficiently even in the case of a monocular camera, the maps prod...
Alexander Flint, Christopher Mei, Ian D. Reid, Dav...
ACL
2012
13 years 14 days ago
A Feature-Rich Constituent Context Model for Grammar Induction
We present LLCCM, a log-linear variant of the constituent context model (CCM) of grammar induction. LLCCM retains the simplicity of the original CCM but extends robustly to long s...
Dave Golland, John DeNero, Jakob Uszkoreit
IPPS
2007
IEEE
15 years 4 months ago
Measuring the Robustness of Resource Allocations in a Stochastic Dynamic Environment
Heterogeneous distributed computing systems often must operate in an environment where system parameters are subject to uncertainty. Robustness can be defined as the degree to wh...
Jay Smith, Luis Diego Briceno, Anthony A. Maciejew...
CVPR
2008
IEEE
16 years 2 days ago
Robust tensor factorization using R1 norm
Over the years, many tensor based algorithms, e.g. two dimensional principle component analysis (2DPCA), two dimensional singular value decomposition (2DSVD), high order SVD, have...
Heng Huang, Chris H. Q. Ding