Sciweavers

919 search results - page 157 / 184
» Improved analysis methods for crossover-based algorithms
Sort
View
PODS
2009
ACM
100views Database» more  PODS 2009»
16 years 2 months ago
Space-optimal heavy hitters with strong error bounds
The problem of finding heavy hitters and approximating the frequencies of items is at the heart of many problems in data stream analysis. It has been observed that several propose...
Radu Berinde, Graham Cormode, Piotr Indyk, Martin ...
MOBIHOC
2008
ACM
16 years 1 months ago
Dynamic packet fragmentation for wireless channels with failures
It was shown recently [7?9], under quite general conditions, that retransmission-based protocols may result in power-law delays and possibly zero throughput even if the distributi...
Predrag R. Jelenkovic, Jian Tan
PAMI
2006
186views more  PAMI 2006»
15 years 1 months ago
Performance Evaluation of Fingerprint Verification Systems
This paper is concerned with the performance evaluation of fingerprint verification systems. After an initial classification of biometric testing initiatives, we explore both the t...
Raffaele Cappelli, Dario Maio, Davide Maltoni, Jam...
ICRA
1998
IEEE
108views Robotics» more  ICRA 1998»
15 years 6 months ago
Zoom Tracking
We present a new active vision technique called zoom tracking. Zoom tracking is the continuous adjustment of a camera's focal length in order to keep a constant-sized image of...
Jeffrey A. Fayman, Oded Sudarsky, Ehud Rivlin
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
16 years 2 months ago
SNARE: a link analytic system for graph labeling and risk detection
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...