Sciweavers

247 search results - page 10 / 50
» Ideals without CCC
Sort
View
116
Voted
ACCV
2009
Springer
15 years 1 months ago
Person De-identification in Videos
Advances in cameras and web technology have made it easy to capture and share large amounts of video data over to a large number of people. A large number of cameras oversee public...
Prachi Agrawal, P. J. Narayanan
IDEAL
2010
Springer
14 years 10 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...
IDEAL
2010
Springer
14 years 9 months ago
Robust 1-Norm Soft Margin Smooth Support Vector Machine
Based on studies and experiments on the loss term of SVMs, we argue that 1-norm measurement is better than 2-norm measurement for outlier resistance. Thus, we modify the previous 2...
Li-Jen Chien, Yuh-Jye Lee, Zhi-Peng Kao, Chih-Chen...
157
Voted
SENSYS
2006
ACM
15 years 6 months ago
Target tracking with binary proximity sensors: fundamental limits, minimal descriptions, and algorithms
We explore fundamental performance limits of tracking a target in a two-dimensional field of binary proximity sensors, and design algorithms that attain those limits. In particul...
Nisheeth Shrivastava, Raghuraman Mudumbai, Upamany...
SIGMETRICS
2010
ACM
233views Hardware» more  SIGMETRICS 2010»
15 years 5 months ago
Incentivizing peer-assisted services: a fluid shapley value approach
A new generation of content delivery networks for live streaming, video on demand, and software updates takes advantage of a peer-to-peer architecture to reduce their operating co...
Vishal Misra, Stratis Ioannidis, Augustin Chaintre...