Sciweavers

9405 search results - page 1830 / 1881
» Computing a Model of Set Theory
Sort
View
135
Voted
CSFW
2011
IEEE
14 years 3 months ago
Local Memory via Layout Randomization
—Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve ...
Radha Jagadeesan, Corin Pitcher, Julian Rathke, Ja...
169
Voted
SDM
2012
SIAM
278views Data Mining» more  SDM 2012»
13 years 6 months ago
Legislative Prediction via Random Walks over a Heterogeneous Graph
In this article, we propose a random walk-based model to predict legislators’ votes on a set of bills. In particular, we first convert roll call data, i.e. the recorded votes a...
Jun Wang, Kush R. Varshney, Aleksandra Mojsilovic
159
Voted
CVPR
2009
IEEE
16 years 10 months ago
Dictionary-Free Categorization of Very Similar Objects via Stacked Evidence Trees
Current work in object categorization discriminates among objects that typically possess gross differences which are readily apparent. However, many applications require making ...
Andrew Moldenke, Asako Yamamuro, David A. Lytle, E...
CVPR
2007
IEEE
16 years 5 months ago
Discriminative Cluster Refinement: Improving Object Category Recognition Given Limited Training Data
A popular approach to problems in image classification is to represent the image as a bag of visual words and then employ a classifier to categorize the image. Unfortunately, a si...
Liu Yang, Rong Jin, Caroline Pantofaru, Rahul Sukt...
139
Voted
ICCV
2003
IEEE
16 years 5 months ago
A Class of Photometric Invariants: Separating Material from Shape and Illumination
We derive a new class of photometric invariants that can be used for a variety of vision tasks including lighting invariant material segmentation, change detection and tracking, a...
Srinivasa G. Narasimhan, Visvanathan Ramesh, Shree...
« Prev « First page 1830 / 1881 Last » Next »