Sciweavers

146 search results - page 23 / 30
» Formulating context-dependent similarity functions
Sort
View
76
Voted
ICML
2008
IEEE
15 years 10 months ago
Efficiently solving convex relaxations for MAP estimation
The problem of obtaining the maximum a posteriori (map) estimate of a discrete random field is of fundamental importance in many areas of Computer Science. In this work, we build ...
M. Pawan Kumar, Philip H. S. Torr
SOUPS
2009
ACM
15 years 4 months ago
Conditioned-safe ceremonies and a user study of an application to web authentication
We introduce the notion of a conditioned-safe ceremony. A “ceremony” is similar to the conventional notion of a protocol, except that a ceremony explicitly includes human part...
Chris Karlof, J. D. Tygar, David Wagner
GLOBECOM
2007
IEEE
15 years 4 months ago
A Steepest Descent Relocation Algorithm for Placement of Sinks in a Sensor Network
— In this paper we use an information flow model for placement of traffic sinks in a wireless sensor network. Our mathematical model translates a communication network composed...
Mehdi Kalantari, Mark A. Shayman
ICMI
2004
Springer
152views Biometrics» more  ICMI 2004»
15 years 3 months ago
Exploiting prosodic structuring of coverbal gesticulation
Although gesture recognition has been studied extensively, communicative, affective, and biometrical “utility” of natural gesticulation remains relatively unexplored. One of t...
Sanshzar Kettebekov
PCM
2004
Springer
107views Multimedia» more  PCM 2004»
15 years 3 months ago
Automatic Peak Number Detection in Image Symmetry Analysis
Abstract. In repeated pattern analysis, peak number detection in autocorrelation is of key importance, which subsequently determines the correctness of the constructed lattice. Pre...
Jingrui He, Mingjing Li, HongJiang Zhang, Hanghang...