Sciweavers

13026 search results - page 2604 / 2606
» Probabilistic Relational Models
Sort
View
SODA
2012
ACM
173views Algorithms» more  SODA 2012»
13 years 2 months ago
Resource augmentation for weighted flow-time explained by dual fitting
We propose a general dual-fitting technique for analyzing online scheduling algorithms in the unrelated machines setting where the objective function involves weighted flow-time...
S. Anand 0002, Naveen Garg, Amit Kumar
CVPR
2012
IEEE
13 years 2 months ago
Bag of textons for image segmentation via soft clustering and convex shift
We propose an unsupervised image segmentation method based on texton similarity and mode seeking. The input image is first convolved with a filter-bank, followed by soft cluster...
Zhiding Yu, Ang Li, Oscar C. Au, Chunjing Xu
142
Voted
SDM
2012
SIAM
208views Data Mining» more  SDM 2012»
13 years 2 months ago
Mining Massive Archives of Mice Sounds with Symbolized Representations
Many animals produce long sequences of vocalizations best described as “songs.” In some animals, such as crickets and frogs, these songs are relatively simple and repetitive c...
Jesin Zakaria, Sarah Rotschafer, Abdullah Mueen, K...
TMC
2012
13 years 2 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
ESORICS
2012
Springer
13 years 2 months ago
Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data
In certain applications, it is important for a remote server to securely determine whether or not two mobile devices are in close physical proximity. In particular, in the context ...
Tzipora Halevi, Di Ma, Nitesh Saxena, Tuo Xiang
« Prev « First page 2604 / 2606 Last » Next »