Sciweavers

1984 search results - page 373 / 397
» Variable mesh optimization for continuous optimization probl...
Sort
View
CVPR
2007
IEEE
15 years 2 months ago
PrivacyCam: a Privacy Preserving Camera Using uCLinux on the Blackfin DSP
Considerable research work has been done in the area of surveillance and biometrics, where the goals have always been high performance, robustness in security and cost optimizatio...
Ankur Chattopadhyay, Terrance E. Boult
CORR
2007
Springer
106views Education» more  CORR 2007»
15 years 1 months ago
Bandit Algorithms for Tree Search
Bandit based methods for tree search have recently gained popularity when applied to huge trees, e.g. in the game of go [6]. Their efficient exploration of the tree enables to ret...
Pierre-Arnaud Coquelin, Rémi Munos
143
Voted
KDD
2012
ACM
263views Data Mining» more  KDD 2012»
13 years 4 months ago
Integrating community matching and outlier detection for mining evolutionary community outliers
Temporal datasets, in which data evolves continuously, exist in a wide variety of applications, and identifying anomalous or outlying objects from temporal datasets is an importan...
Manish Gupta, Jing Gao, Yizhou Sun, Jiawei Han
ESCIENCE
2006
IEEE
15 years 8 months ago
WISENT: e-Science for Energy Meteorology
Our energy production increasingly depends on renewable energy sources, which impose new challenges for distributed and decentralized systems. One problem is that the availability...
Wilhelm Hasselbring, Detlev Heinemann, Johannes Hu...
113
Voted
AINA
2004
IEEE
15 years 5 months ago
Mobile IPv6 Extensions to support Nested Mobile Networks
Unlike host mobility support, network mobility is concerned with situations where an entire network changes its point of attachment to the Internet. Furthermore, we should conside...
ZhiJun Gu, Dongmin Yang, Cheeha Kim