Sciweavers

478 search results - page 7 / 96
» Local Search for Computing Normal Circumstances Models
Sort
View
97
Voted
ECCV
2004
Springer
16 years 2 months ago
Texture Boundary Detection for Real-Time Tracking
Abstract We propose an approach to texture boundary detection that only requires a line-search in the direction normal to the edge. It is therefore very fast and can be incorporate...
Ali Shahrokni, Tom Drummond, Pascal Fua
113
Voted
CIKM
2011
Springer
14 years 11 days ago
Lower-bounding term frequency normalization
In this paper, we reveal a common deficiency of the current retrieval models: the component of term frequency (TF) normalization by document length is not lower-bounded properly;...
Yuanhua Lv, ChengXiang Zhai
100
Voted
MM
2004
ACM
99views Multimedia» more  MM 2004»
15 years 5 months ago
Locality preserving clustering for image database
It is important and challenging to make the growing image repositories easy to search and browse. Image clustering is a technique that helps in several ways, including image data ...
Xin Zheng, Deng Cai, Xiaofei He, Wei-Ying Ma, Xuey...
EVOW
2007
Springer
15 years 4 months ago
An Evolutionary Approach to Computer-Aided Orchestration
In this paper we introduce an hybrid evolutionary algorithm for computer-aided orchestration. Our current approach to orchestration consists in replicating a target sound with a se...
Grégoire Carpentier, Damien Tardieu, G&eacu...
SERSCISA
2009
Springer
15 years 7 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim