Sciweavers

3110 search results - page 532 / 622
» On the initialization of the DNMF algorithm
Sort
View
CROSSROADS
2004
108views more  CROSSROADS 2004»
15 years 4 months ago
A distributed security scheme for ad hoc networks
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad h...
Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedh...
NAACL
2010
15 years 2 months ago
From Baby Steps to Leapfrog: How "Less is More" in Unsupervised Dependency Parsing
We present three approaches for unsupervised grammar induction that are sensitive to data complexity and apply them to Klein and Manning's Dependency Model with Valence. The ...
Valentin I. Spitkovsky, Hiyan Alshawi, Daniel Jura...
SIGIR
2010
ACM
15 years 2 months ago
DivQ: diversification for keyword search over structured databases
Keyword queries over structured databases are notoriously ambiguous. No single interpretation of a keyword query can satisfy all users, and multiple interpretations may yield over...
Elena Demidova, Peter Fankhauser, Xuan Zhou, Wolfg...
149
Voted
SSPR
2010
Springer
15 years 2 months ago
Extracting Plane Graphs from Images
Abstract. In order to use structural techniques from graph-based pattern recognition, a first necessary step consists in extracting a graph in an automatic way from an image. We pr...
Émilie Samuel, Colin de la Higuera, Jean-Ch...
UIST
2010
ACM
15 years 2 months ago
Combining multiple depth cameras and projectors for interactions on, above and between surfaces
Instrumented with multiple depth cameras and projectors, LightSpace is a small room installation designed to explore a variety of interactions and computational strategies related...
Andrew D. Wilson, Hrvoje Benko