Sciweavers

3143 search results - page 598 / 629
» Minimization of entropy functionals
Sort
View
FSTTCS
2009
Springer
15 years 4 months ago
Bounded Size Graph Clustering with Applications to Stream Processing
We introduce a graph clustering problem motivated by a stream processing application. Input to our problem is an undirected graph with vertex and edge weights. A cluster is a subse...
Rohit Khandekar, Kirsten Hildrum, Sujay Parekh, De...
IWDC
2001
Springer
101views Communications» more  IWDC 2001»
15 years 4 months ago
Resource Stealing in Endpoint Controlled Multi-class Networks
Abstract. Endpoint admission control is a mechanism for achieving scalable services by pushing quality-of-service functionality to end hosts. In particular, hosts probe the network...
Susana Sargento, Rui Valadas, Edward W. Knightly
NEUROSCIENCE
2001
Springer
15 years 4 months ago
Role of the Cerebellum in Time-Critical Goal-Oriented Behaviour: Anatomical Basis and Control Principle
The Brain is a slow computer yet humans can skillfully play games such as tennis where very fast reactions are required. Of particular interest is the evidence for strategic thinki...
Guido Bugmann
SSIAI
2000
IEEE
15 years 4 months ago
A New Bayesian Relaxation Framework for the Estimation and Segmentation of Multiple Motions
In this paper we propose a new probabilistic relaxation framework to perform robust multiple motion estimation and segmentation from a sequence of images. Our approach uses displa...
Alexander Strehl, Jake K. Aggarwal
IH
1999
Springer
15 years 4 months ago
Hiding Signatures in Graph Coloring Solutions
Abstract. One way to protect a digital product is to embed an author's signature into the object in the form of minute errors. However, this technique cannot be directly appli...
Gang Qu, Miodrag Potkonjak