Sciweavers

1591 search results - page 294 / 319
» Random lifts of graphs
Sort
View
IFIPTM
2009
109views Management» more  IFIPTM 2009»
14 years 7 months ago
Elimination of Subjectivity from Trust Recommendation
In many distributed applications, a party who wishes to make a transaction requires that it has a certain level of trust in the other party. It is frequently the case that the part...
Omar Hasan, Lionel Brunie, Jean-Marc Pierson, Elis...
CORR
2010
Springer
128views Education» more  CORR 2010»
14 years 7 months ago
Trajectory Codes for Flash Memory
Abstract--Flash memory is well-known for its inherent asymmetry: the flash-cell charge levels are easy to increase but are hard to decrease. In a general rewriting model, the store...
Anxiao Jiang, Michael Langberg, Moshe Schwartz, Je...
ACCV
2010
Springer
14 years 4 months ago
Human Pose Estimation Using Exemplars and Part Based Refinement
In this paper, we proposed a fast and accurate human pose estimation framework that combines top-down and bottom-up methods. The framework consists of an initialization stage and a...
Yanchao Su, Haizhou Ai, Takayoshi Yamashita, Shiho...
ACCV
2010
Springer
14 years 4 months ago
Four Color Theorem for Fast Early Vision
Recent work on early vision such as image segmentation, image restoration, stereo matching, and optical flow models these problems using Markov Random Fields. Although this formula...
Radu Timofte, Luc J. Van Gool
CORR
2011
Springer
200views Education» more  CORR 2011»
14 years 4 months ago
An Analysis of Optimal Link Bombs
We analyze the recent phenomenon termed a Link Bomb, and investigate the optimal attack pattern for a group of web pages attempting to link bomb a specific web page. The typical ...
Sibel Adali, Tina Liu, Malik Magdon-Ismail