Sciweavers

1050 search results - page 167 / 210
» Two methods of authenticated positioning
Sort
View
JOIN
2006
113views more  JOIN 2006»
15 years 1 months ago
Local Detection of Selfish Routing Behavior in Ad Hoc Networks
Reputation mechanisms for detecting and punishing free-riders in ad hoc networks depend on the local detection of selfish behavior. Although naive selfish strategies based on drop...
Bo Wang 0001, Sohraab Soltani, Jonathan K. Shapiro...
PR
2006
116views more  PR 2006»
15 years 1 months ago
Correspondence matching using kernel principal components analysis and label consistency constraints
This paper investigates spectral approaches to the problem of point pattern matching. We make two contributions. First, we consider rigid point-set alignment. Here we show how ker...
Hongfang Wang, Edwin R. Hancock
IJCV
2007
196views more  IJCV 2007»
15 years 1 months ago
Weakly Supervised Scale-Invariant Learning of Models for Visual Recognition
We investigate a method for learning object categories in a weakly supervised manner. Given a set of images known to contain the target category from a similar viewpoint, learning...
Robert Fergus, Pietro Perona, Andrew Zisserman
CLASSIFICATION
2004
59views more  CLASSIFICATION 2004»
15 years 1 months ago
Oscillation Heuristics for the Two-group Classification Problem
: We propose a new nonparametric family of oscillation heuristics for improving linear classifiers in the two-group discriminant problem. The heuristics are motivated by the intuit...
Ognian Asparouhov, Paul A. Rubin
IJCV
2000
180views more  IJCV 2000»
15 years 1 months ago
Probabilistic Models of Appearance for 3-D Object Recognition
We describe how to model the appearance of a 3-D object using multiple views, learn such a model from training images, and use the model for object recognition. The model uses pro...
Arthur R. Pope, David G. Lowe