Sciweavers

2109 search results - page 378 / 422
» Solving Necklace Constraint Problems
Sort
View
102
Voted
CHI
2004
ACM
16 years 1 months ago
A commonsense approach to predictive text entry
People cannot type as fast as they think, especially when faced with the constraints of mobile devices. There have been numerous approaches to solving this problem, including rese...
Tom Stocky, Alexander Faaborg, Henry Lieberman
CVPR
2010
IEEE
15 years 9 months ago
Locality-constrained Linear Coding for Image Classification
The traditional SPM approach based on bag-of-features (BoF) must use nonlinear classifiers to achieve good image classification performance. This paper presents a simple but effec...
Jinjun Wang, Jianchao Yang, Kai Yu, Fengjun Lv
113
Voted
IEEECIT
2009
IEEE
15 years 7 months ago
SLA-Aware Virtual Resource Management for Cloud Infrastructures
Cloud platforms host several independent applications on a shared resource pool with the ability to allocate computing power to applications on a per-demand basis. The use of serv...
Hien Nguyen Van, Frédéric Dang Tran,...
111
Voted
ACML
2009
Springer
15 years 7 months ago
Robust Discriminant Analysis Based on Nonparametric Maximum Entropy
In this paper, we propose a Robust Discriminant Analysis based on maximum entropy (MaxEnt) criterion (MaxEnt-RDA), which is derived from a nonparametric estimate of Renyi’s quadr...
Ran He, Bao-Gang Hu, Xiaotong Yuan
KCAP
2009
ACM
15 years 7 months ago
Workflow matching using semantic metadata
Workflows are becoming an increasingly more common paradigm to manage scientific analyses. As workflow repositories start to emerge, workflow retrieval and discovery becomes a cha...
Yolanda Gil, Jihie Kim, Gonzalo Flórez Puga...