Sciweavers

5934 search results - page 1114 / 1187
» Detecting a Network Failure
Sort
View
ATAL
2011
Springer
14 years 5 months ago
Decomposing constraint systems: equivalences and computational properties
Distributed systems can often be modeled as a collection of distributed (system) variables whose values are constrained by a set of constraints. In distributed multi-agent systems...
Wiebe van der Hoek, Cees Witteveen, Michael Wooldr...
197
Voted
KDD
2012
ACM
271views Data Mining» more  KDD 2012»
13 years 7 months ago
GigaTensor: scaling tensor analysis up by 100 times - algorithms and discoveries
Many data are modeled as tensors, or multi dimensional arrays. Examples include the predicates (subject, verb, object) in knowledge bases, hyperlinks and anchor texts in the Web g...
U. Kang, Evangelos E. Papalexakis, Abhay Harpale, ...
TMC
2012
13 years 7 months ago
Sensing Driver Phone Use with Acoustic Ranging through Car Speakers
—This work addresses the fundamental problem of distinguishing between a driver and passenger using a mobile phone, which is the critical input to enable numerous safety and inte...
Jie Yang 0003, Simon Sidhom, Gayathri Chandrasekar...
CVPR
2000
IEEE
16 years 7 months ago
Fast Multiscale Image Segmentation
We introduce a fast, multiscale algorithm for image segmentation. Our algorithm uses modern numeric techniques to nd an approximate solution to normalized cut measures in time tha...
Eitan Sharon, Achi Brandt, Ronen Basri
CVPR
2004
IEEE
16 years 7 months ago
Bayesian Fusion of Camera Metadata Cues in Semantic Scene Classification
Semantic scene classification based only on low-level vision cues has had limited success on unconstrained image sets. On the other hand, camera metadata related to capture condit...
Matthew R. Boutell, Jiebo Luo
« Prev « First page 1114 / 1187 Last » Next »