Sciweavers

1813 search results - page 306 / 363
» Instance Pruning Techniques
Sort
View
CORR
2010
Springer
132views Education» more  CORR 2010»
14 years 7 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta

Publication
659views
14 years 5 months ago
A Large-Scale Hierarchical Multi-View RGB-D Object Dataset
Over the last decade, the availability of public image repositories and recognition benchmarks has enabled rapid progress in visual object category and instance detection. Today we...
Kevin Lai, Liefeng Bo, Xiaofeng Ren and Dieter Fox
CVPR
2011
IEEE
14 years 5 months ago
Large-Scale Live Active Learning: Training Object Detectors with Crawled Data and Crowds
Active learning and crowdsourcing are promising ways to efficiently build up training sets for object recognition, but thus far techniques are tested in artificially controlled ...
Sudheendra Vijayanarasimhan, Kristen Grauman
DATE
2010
IEEE
197views Hardware» more  DATE 2010»
14 years 4 months ago
Compilation of stream programs for multicore processors that incorporate scratchpad memories
The stream processing characteristics of many embedded system applications in multimedia and networking domains have led to the advent of stream based programming formats. Several ...
Weijia Che, Amrit Panda, Karam S. Chatha
TCAD
2011
14 years 4 months ago
GRIP: Global Routing via Integer Programming
Abstract—This work introduces GRIP, a global routing technique via integer programming. GRIP optimizes wirelength and via cost directly without going through a traditional layer ...
Tai-Hsuan Wu, Azadeh Davoodi, Jeffrey T. Linderoth