Sciweavers

893 search results - page 108 / 179
» Descent Theory for Schemes
Sort
View
CVPR
2003
IEEE
16 years 1 months ago
Illumination Normalization with Time-dependent Intrinsic Images for Video Surveillance
Cast shadows produce troublesome effects for video surveillance systems, typically for object tracking from a fixed viewpoint, since it yields appearance variations of objects dep...
Yasuyuki Matsushita, Ko Nishino, Katsushi Ikeuchi,...
STOC
2004
ACM
126views Algorithms» more  STOC 2004»
16 years 4 days ago
Bypassing the embedding: algorithms for low dimensional metrics
The doubling dimension of a metric is the smallest k such that any ball of radius 2r can be covered using 2k balls of raThis concept for abstract metrics has been proposed as a na...
Kunal Talwar
MOBIHOC
2008
ACM
15 years 11 months ago
Self-monitoring for sensor networks
Local monitoring is an effective mechanism for the security of wireless sensor networks (WSNs). Existing schemes assume the existence of sufficient number of active nodes to carry...
Dezun Dong, Yunhao Liu, Xiangke Liao
DAC
2009
ACM
15 years 6 months ago
Throughput optimal task allocation under thermal constraints for multi-core processors
It is known that temperature gradients and thermal hotspots affect the reliability of microprocessors. Temperature is also an important constraint when maximizing the performance...
Vinay Hanumaiah, Ravishankar Rao, Sarma B. K. Vrud...
KDD
2009
ACM
168views Data Mining» more  KDD 2009»
15 years 6 months ago
Cartesian contour: a concise representation for a collection of frequent sets
In this paper, we consider a novel scheme referred to as Cartesian contour to concisely represent the collection of frequent itemsets. Different from the existing works, this sche...
Ruoming Jin, Yang Xiang, Lin Liu