Sciweavers

1064 search results - page 153 / 213
» Exact Algorithms for the Quadratic Linear Ordering Problem
Sort
View
CVPR
2010
IEEE
15 years 9 months ago
Weakly-Supervised Hashing in Kernel Space
The explosive growth of the vision data motivates the recent studies on efficient data indexing methods such as locality-sensitive hashing (LSH). Most existing approaches perform...
Yadong Mu, Jialie Shen, Shuicheng Yan
AIPS
2010
15 years 5 months ago
Incrementally Solving STNs by Enforcing Partial Path Consistency
Efficient management and propagation of temporal constraints is important for temporal planning as well as for scheduling. During plan development, new events and temporal constra...
Léon Planken, Mathijs de Weerdt, Neil Yorke...
JSC
2007
79views more  JSC 2007»
15 years 4 months ago
Computation of bases of free modules over the Weyl algebras
A well-known result due to J. T. Stafford asserts that a stably free left module M over the Weyl algebras D = An(k) or Bn(k) − where k is a field of characteristic 0 − with ...
Alban Quadrat, Daniel Robertz
CVPR
2012
IEEE
13 years 6 months ago
Light field denoising, light field superresolution and stereo camera based refocussing using a GMM light field patch prior
With the recent availability of commercial light field cameras, we can foresee a future in which light field signals will be as common place as images. Hence, there is an immine...
Kaushik Mitra, Ashok Veeraraghavan
COMCOM
2006
88views more  COMCOM 2006»
15 years 4 months ago
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
To defend against multi-step intrusions in high-speed networks, efficient algorithms are needed to correlate isolated alerts into attack scenarios. Existing correlation methods us...
Lingyu Wang, Anyi Liu, Sushil Jajodia