Sciweavers

5948 search results - page 375 / 1190
» Computing Robust Counter-Strategies
Sort
View
ICASSP
2011
IEEE
14 years 8 months ago
Joint source-channel-network coding for bidirectional wireless relays
The application of joint source-channel coding, based on fountain codes, in the broadcast timeslot of wireless two-way network coding is investigated in this paper. A computationa...
Francois P. S. Luus, Bodhaswar T. Maharaj
ASMTA
2011
Springer
295views Mathematics» more  ASMTA 2011»
14 years 8 months ago
Performance Evaluation of a Single Node with General Arrivals and Service
Queueing delays experienced by packets buffered at a node are among the most difficult to predict when considering the performance of a flow in a network. The arrivals of packets a...
Alexandre Brandwajn, Thomas Begin
SIGIR
2011
ACM
14 years 7 months ago
When documents are very long, BM25 fails!
We reveal that the Okapi BM25 retrieval function tends to overly penalize very long documents. To address this problem, we present a simple yet effective extension of BM25, namel...
Yuanhua Lv, ChengXiang Zhai
293
Voted

Publication
815views
15 years 1 months ago
Activity Understanding and Unusual Event Detection in Surveillance Videos
Computer scientists have made ceaseless efforts to replicate cognitive video understanding abilities of human brains onto autonomous vision systems. As video surveillance cameras ...
Chen Change Loy
AAAI
2011
14 years 5 months ago
Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty
Attacker-defender Stackelberg games have become a popular game-theoretic approach for security with deployments for LAX Police, the FAMS and the TSA. Unfortunately, most of the ex...
Zhengyu Yin, Manish Jain, Milind Tambe, Fernando O...