Sciweavers

2421 search results - page 223 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
COR
2007
108views more  COR 2007»
15 years 4 months ago
A hub location problem with fully interconnected backbone and access networks
This paper considers the design of two-layered fully interconnected networks.A two-layered network consists of clusters of nodes, each defining an access network and a backbone n...
Tommy Thomadsen, Jesper Larsen
CVPR
2004
IEEE
16 years 6 months ago
Random Sampling LDA for Face Recognition
Linear Discriminant Analysis (LDA) is a popular feature extraction technique for face recognition. However, It often suffers from the small sample size problem when dealing with t...
Xiaogang Wang, Xiaoou Tang
131
Voted
ICIP
2006
IEEE
16 years 6 months ago
Phase Distortion Correction for See-Through-The-Wall Imaging Radar
See Through The Wall (STTW) applications have become of high importance to law enforcement, homeland security and defense needs. In this work surface penetrating radar is simulate...
Jay A. Marble, Alfred O. Hero
139
Voted
IEEEPACT
2002
IEEE
15 years 9 months ago
Effective Compilation Support for Variable Instruction Set Architecture
Traditional compilers perform their code generation tasks based on a fixed, pre-determined instruction set. This paper describes the implementation of a compiler that determines ...
Jack Liu, Timothy Kong, Fred C. Chow
AAAI
1996
15 years 5 months ago
Total-Order Multi-Agent Task-Network Planning for Contract Bridge
This paper describes the results of applying a modified version of hierarchical task-network (HTN) planning to the problem of declarer play in contract bridge. We represent inform...
Stephen J. J. Smith, Dana S. Nau, Thomas A. Throop