Sciweavers

3047 search results - page 471 / 610
» Randomized Parallel Selection
Sort
View
149
Voted
INFOCOM
2011
IEEE
14 years 6 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
161
Voted
ICDAR
2011
IEEE
14 years 2 months ago
A New Feature Optimization Method Based on Two-Directional 2DLDA for Handwritten Chinese Character Recognition
—LDA transformation is one of the popular feature dimension reduction techniques for the feature extraction in most handwritten Chinese characters recognition systems. The integr...
Xue Gao, Wenhuan Wen, Lianwen Jin
158
Voted
JMLR
2012
13 years 5 months ago
Age-Layered Expectation Maximization for Parameter Learning in Bayesian Networks
The expectation maximization (EM) algorithm is a popular algorithm for parameter estimation in models with hidden variables. However, the algorithm has several non-trivial limitat...
Avneesh Singh Saluja, Priya Krishnan Sundararajan,...
168
Voted
CVPR
2012
IEEE
13 years 5 months ago
Bridging the past, present and future: Modeling scene activities from event relationships and global rules
This paper addresses the discovery of activities and learns the underlying processes that govern their occurrences over time in complex surveillance scenes. To this end, we propos...
Jagannadan Varadarajan, Rémi Emonet, Jean-M...
172
Voted
CVPR
2012
IEEE
13 years 5 months ago
Discovering localized attributes for fine-grained recognition
Attributes are visual concepts that can be detected by machines, understood by humans, and shared across categories. They are particularly useful for fine-grained domains where c...
Kun Duan, Devi Parikh, David J. Crandall, Kristen ...