Sciweavers

2774 search results - page 535 / 555
» Exploiting Deep Structure
Sort
View
129
Voted
ATAL
2010
Springer
15 years 3 months ago
Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mod...
Zhengyu Yin, Dmytro Korzhyk, Christopher Kiekintve...
164
Voted
MM
2010
ACM
215views Multimedia» more  MM 2010»
15 years 2 months ago
Sirio, orione and pan: an integrated web system for ontology-based video search and annotation
In this technical demonstration we show an integrated web system for video search and annotation based on ontologies. The system is composed by three components: the Orione1 ontol...
Marco Bertini, Gianpaolo D'Amico, Andrea Ferracani...
FPGA
2010
ACM
232views FPGA» more  FPGA 2010»
15 years 2 months ago
High-throughput bayesian computing machine with reconfigurable hardware
We use reconfigurable hardware to construct a high throughput Bayesian computing machine (BCM) capable of evaluating probabilistic networks with arbitrary DAG (directed acyclic gr...
Mingjie Lin, Ilia Lebedev, John Wawrzynek
CDC
2008
IEEE
125views Control Systems» more  CDC 2008»
15 years 2 months ago
Efficient waypoint tracking hybrid controllers for double integrators using classical time optimal control
This paper is a response to requests from several respected colleagues in academia for a careful writeup of the classical time-optimal control based hybrid controllers that we have...
Haitham A. Hindi, Lara S. Crawford, Rong Zhou, Cra...
144
Voted
CISIS
2007
IEEE
15 years 2 months ago
Gridifying IBM's Generic Log Adapter to Speed-Up the Processing of Log Data
Problem determination in today's computing environments consumes between 30 and 70% of an organization’s IT resources and represents from one third to one half of their tot...
Claudi Paniagua, Fatos Xhafa, Thanasis Daradoumis