Sciweavers

2370 search results - page 384 / 474
» The Characterization of Data-Accumulating Algorithms
Sort
View
PAMI
2008
137views more  PAMI 2008»
14 years 9 months ago
IRGS: Image Segmentation Using Edge Penalties and Region Growing
This paper proposes an image segmentation method named iterative region growing using semantics (IRGS), which is characterized by two aspects. First, it uses graduated increased ed...
Qiyao Yu, David A. Clausi
PPL
2008
75views more  PPL 2008»
14 years 9 months ago
Modeling the Performance of Communication Schemes on Network Topologies
This paper investigates the influence of the interconnection network topology of a parallel system on the delivery time of an ensemble of messages, called the communication scheme...
Jan Lemeire, Erik F. Dirkx, Walter Colitti
SIGIR
2008
ACM
14 years 9 months ago
To personalize or not to personalize: modeling queries with variation in user intent
In most previous work on personalized search algorithms, the results for all queries are personalized in the same manner. However, as we show in this paper, there is a lot of vari...
Jaime Teevan, Susan T. Dumais, Daniel J. Liebling
IJRR
2007
75views more  IJRR 2007»
14 years 9 months ago
Surveillance Strategies for a Pursuer with Finite Sensor Range
This paper addresses the pursuit-evasion problem of maintaining surveillance by a pursuer of an evader in a world populated by polygonal obstacles. This requires the pursuer to pl...
Rafael Murrieta-Cid, Teja Muppirala, Alejandro Sar...
TCS
2008
14 years 9 months ago
Optimizing deletion cost for secure multicast key management
Multicast and broadcast are efficient ways to deliver messages to a group of recipients in a network. Due to the growing security concerns in various applications, messages are oft...
Zhi-Zhong Chen, Ze Feng, Minming Li, F. Frances Ya...