Sciweavers

13026 search results - page 2409 / 2606
» Probabilistic Relational Models
Sort
View
ICC
2009
IEEE
130views Communications» more  ICC 2009»
15 years 1 months ago
Verification of Secret Key Generation from UWB Channel Observations
Theoretical models of ultrawideband (UWB) radio channels indicate that pairs of UWB radio transceivers measure their common radio channel with a high degree of agreement and third ...
Masoud Ghoreishi Madiseh, Shuai He, Michael L. McG...
ICCV
2009
IEEE
15 years 1 months ago
Landmark classification in large-scale image collections
With the rise of photo-sharing websites such as Facebook and Flickr has come dramatic growth in the number of photographs online. Recent research in object recognition has used su...
Yunpeng Li, David J. Crandall, Daniel P. Huttenloc...
ICDM
2009
IEEE
171views Data Mining» more  ICDM 2009»
15 years 1 months ago
Hybrid Clustering by Integrating Text and Citation Based Graphs in Journal Database Analysis
We propose a hybrid clustering strategy by integrating heterogeneous information sources as graphs. The hybrid clustering method is extended on the basis of modularity based Louva...
Xinhai Liu, Shi Yu, Yves Moreau, Frizo A. L. Janss...
ICIP
2009
IEEE
15 years 1 months ago
Utilizing affective analysis for efficient movie browsing
Because of the fast increasing number of movies and long time span each movie lasts, novel methods should be developed to help users browse movies and find their desired clips eff...
Shiliang Zhang, Qi Tian, Qingming Huang, Wen Gao, ...
ICITS
2009
15 years 1 months ago
Linear Threshold Multisecret Sharing Schemes
In a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a different associated access structure. We consider here un...
Oriol Farràs, Ignacio Gracia, Sebasti&agrav...
« Prev « First page 2409 / 2606 Last » Next »