Sciweavers

1050 search results - page 128 / 210
» Two methods of authenticated positioning
Sort
View
ICIP
2004
IEEE
16 years 3 months ago
Virtual view synthesis through linear processing without geometry
This paper presents a new approach for virtual view synthesis that does not require any information of scene geometry. Our approach first generates multiple virtual views at the s...
Akira Kubota, Kiyoharu Aizawa, Tsuhan Chen
104
Voted
SDM
2009
SIAM
152views Data Mining» more  SDM 2009»
15 years 11 months ago
Non-negative Matrix Factorization, Convexity and Isometry.
In this paper we explore avenues for improving the reliability of dimensionality reduction methods such as Non-Negative Matrix Factorization (NMF) as interpretive exploratory data...
Nikolaos Vasiloglou, Alexander G. Gray, David V. A...
SEKE
2007
Springer
15 years 8 months ago
Adjudicator: A Statistical Approach for Learning Ontology Concepts from Peer Agents
— We present a statistical approach for software agents to learn ontology concepts from peer agents by asking them whether they can reach consensus on significant differences bet...
Behrouz Homayoun Far, Abdel Halim Elamy, Nora Houa...
126
Voted
AINA
2005
IEEE
15 years 7 months ago
Nodes Localization through Data Fusion in Sensor Network
The Location of nodes in sensor network is an important problem with application in resource allocation, location sensitive browsing, and emergency communications. A key problem i...
Ren C. Luo, Ogst Chen, Liang Chao Tu
111
Voted
MLDM
2005
Springer
15 years 7 months ago
Unsupervised Learning of Visual Feature Hierarchies
We propose an unsupervised, probabilistic method for learning visual feature hierarchies. Starting from local, low-level features computed at interest point locations, the method c...
Fabien Scalzo, Justus H. Piater