Sciweavers

13180 search results - page 2511 / 2636
» Network Models
Sort
View
PAMI
2011
14 years 6 months ago
Construction of Iso-Contours, Bisectors, and Voronoi Diagrams on Triangulated Surfaces
—In the research of computer vision and machine perception, three-dimensional objects are usually represented by 2-manifold triangular meshes M. In this paper, we present practic...
Yong-Jin Liu, Zhanqing Chen, Kai Tang
ICCV
2011
IEEE
14 years 3 months ago
Gradient-based learning of higher-order image features
Recent work on unsupervised feature learning has shown that learning on polynomial expansions of input patches, such as on pair-wise products of pixel intensities, can improve the...
Roland Memisevic
AAAI
2011
14 years 3 months ago
Stopping Rules for Randomized Greedy Triangulation Schemes
Many algorithms for performing inference in graphical models have complexity that is exponential in the treewidth - a parameter of the underlying graph structure. Computing the (m...
Andrew Gelfand, Kalev Kask, Rina Dechter
COMPSAC
2011
IEEE
14 years 3 months ago
Precise Propagation of Fault-Failure Correlations in Program Flow Graphs
Abstract—Statistical fault localization techniques find suspicious faulty program entities in programs by comparing passed and failed executions. Existing studies show that such ...
Zhenyu Zhang, W. K. Chan, T. H. Tse, Bo Jiang
COMSNETS
2012
222views more  COMSNETS 2012»
13 years 11 months ago
Exploring the design space of social network-based Sybil defenses
—Recently, there has been significant research interest in leveraging social networks to defend against Sybil attacks. While much of this work may appear similar at first glanc...
Bimal Viswanath, Mainack Mondal, Allen Clement, Pe...
« Prev « First page 2511 / 2636 Last » Next »