Sciweavers

1207 search results - page 62 / 242
» Towards optimal k-anonymization
Sort
View
ICCV
2011
IEEE
14 years 23 days ago
From Contours to 3D Object Detection and Pose Estimation
This paper addresses view-invariant object detection and pose estimation from a single image. While recent work focuses on object-centered representations of point-based object fe...
Nadia Payet, Sinisa Todorovic
INFOCOM
2012
IEEE
13 years 3 months ago
Submodular game for distributed application allocation in shared sensor networks
Abstract—Wireless sensor networks are evolving from singleapplication platforms towards an integrated infrastructure shared by multiple applications. Given the resource constrain...
Chengjie Wu, You Xu, Yixin Chen, Chenyang Lu
102
Voted
MM
2010
ACM
177views Multimedia» more  MM 2010»
15 years 28 days ago
Image tag refinement towards low-rank, content-tag prior and error sparsity
The vast user-provided image tags on the popular photo sharing websites may greatly facilitate image retrieval and management. However, these tags are often imprecise and/or incom...
Guangyu Zhu, Shuicheng Yan, Yi Ma
96
Voted
CEC
2009
IEEE
15 years 7 months ago
Optimization of the sizing of a solar thermal electricity plant: Mathematical programming versus genetic algorithms
— Genetic algorithms (GAs) have been argued to constitute a flexible search thereby enabling to solve difficult problems which classical optimization methodologies may find ha...
Jose M. Cabello, Jose M. Cejudo, Mariano Luque, Fr...
117
Voted
HIPEAC
2005
Springer
15 years 6 months ago
A Practical Method for Quickly Evaluating Program Optimizations
This article aims at making iterative optimization practical and usable by speeding up the evaluation of a large range of optimizations. Instead of using a full run to evaluate a s...
Grigori Fursin, Albert Cohen, Michael F. P. O'Boyl...