Sciweavers

8776 search results - page 1623 / 1756
» Robust Data Clustering
Sort
View
DSN
2011
IEEE
14 years 5 months ago
Resource and virtualization costs up in the cloud: Models and design choices
—Virtualization offers the potential for cost-effective service provisioning. For service providers who make significant investments in new virtualized data centers in support of...
Daniel Gmach, Jerry Rolia, Ludmila Cherkasova
183
Voted
ICDAR
2011
IEEE
14 years 5 months ago
Symbol Spotting in Line Drawings through Graph Paths Hashing
—In this paper we propose a symbol spotting technique through hashing the shape descriptors of graph paths (Hamiltonian paths). Complex graphical structures in line drawings can ...
Anjan Dutta, Josep Lladós, Umapada Pal
CORR
2012
Springer
184views Education» more  CORR 2012»
14 years 1 months ago
Noisy-OR Models with Latent Confounding
Given a set of experiments in which varying subsets of observed variables are subject to intervention, we consider the problem of identifiability of causal models exhibiting late...
Antti Hyttinen, Frederick Eberhardt, Patrik O. Hoy...
173
Voted
MMSYS
2012
242views more  MMSYS 2012»
14 years 28 days ago
6DMG: a new 6D motion gesture database
Motion-based control is gaining popularity, and motion gestures form a complementary modality in human-computer interactions. To achieve more robust user-independent motion gestur...
Mingyu Chen, Ghassan Al-Regib, Biing-Hwang Juang
210
Voted
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
13 years 7 months ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang
« Prev « First page 1623 / 1756 Last » Next »