Sciweavers

2176 search results - page 277 / 436
» Refactoring Methods for Knowledge Bases
Sort
View
141
Voted
CORR
2008
Springer
103views Education» more  CORR 2008»
15 years 3 months ago
Generating Random Graphs with Large Girth
We present a simple and efficient algorithm for randomly generating simple graphs without small cycles. These graphs can be used to design high performance Low-Density Parity-Chec...
Mohsen Bayati, Andrea Montanari, Amin Saberi
122
Voted
KI
2006
Springer
15 years 3 months ago
Active Monte Carlo Recognition
In this paper we introduce Active Monte Carlo Recognition (AMCR), a new approach for object recognition. The method is based on seeding and propagating "relational" part...
Felix von Hundelshausen, Manuela M. Veloso
135
Voted
PAMI
2008
188views more  PAMI 2008»
15 years 3 months ago
Segmentation and Tracking of Multiple Humans in Crowded Environments
Segmentation and tracking of multiple humans in crowded situations is made difficult by interobject occlusion. We propose a model-based approach to interpret the image observations...
Tao Zhao, Ramakant Nevatia, Bo Wu
114
Voted
ISF
2007
119views more  ISF 2007»
15 years 3 months ago
Managing the false alarms: A framework for assurance and verification of surveillance monitoring
This article discusses methods to support assurance of surveillance monitoring; and compliance verification knowledge management (CV-KM). The discussion includes aspects of primar...
Peter Goldschmidt
128
Voted
TROB
2008
113views more  TROB 2008»
15 years 3 months ago
Occam's Razor Applied to Network Topology Inference
We present a method for inferring the topology of a sensor network given nondiscriminating observations of activity in the monitored region. This is accomplished based on no prior ...
Dimitri Marinakis, Gregory Dudek