Sciweavers

411 search results - page 76 / 83
» Evaluation and exploitation of knowledge robustness in knowl...
Sort
View
ADHOC
2007
144views more  ADHOC 2007»
14 years 10 months ago
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks
Abstract. Many ad hoc routing algorithms rely on broadcast flooding for location discovery or, more generally, for secure routing applications. Flooding is a robust algorithm but ...
Mike Burmester, Tri Van Le, Alec Yasinsac
ECCV
2008
Springer
15 years 11 months ago
Using Multiple Hypotheses to Improve Depth-Maps for Multi-View Stereo
We propose an algorithm to improve the quality of depth-maps used for Multi-View Stereo (MVS). Many existing MVS techniques make use of a two stage approach which estimates depth-m...
Carlos Hernández, George Vogiatzis, Neill D...
ATAL
2006
Springer
15 years 1 months ago
Efficient agent-based cluster ensembles
Numerous domains ranging from distributed data acquisition to knowledge reuse need to solve the cluster ensemble problem of combining multiple clusterings into a single unified cl...
Adrian K. Agogino, Kagan Tumer
AMFG
2003
IEEE
152views Biometrics» more  AMFG 2003»
15 years 3 months ago
Fully Automatic Upper Facial Action Recognition
This paper provides a new fully automatic framework to analyze facial action units, the fundamental building blocks of facial expression enumerated in Paul Ekman’s Facial Action...
Ashish Kapoor, Yuan (Alan) Qi, Rosalind W. Picard
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
14 years 21 days ago
Warding off the dangers of data corruption with amulet
Occasional corruption of stored data is an unfortunate byproduct of the complexity of modern systems. Hardware errors, software bugs, and mistakes by human administrators can corr...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...