Sciweavers

1692 search results - page 308 / 339
» A Dynamic Network Interdiction Problem
Sort
View
ICIP
2006
IEEE
14 years 10 months ago
Behavior Forensics in Traitors within Traitors for Scalable Multimedia
A cost effective attack against multimedia forensics is the multiuser collusion attack, in which several attackers mount attacks collectively to remove traces of the identifying f...
K. J. Ray Liu, H. Vicky Zhao
ICDE
2007
IEEE
123views Database» more  ICDE 2007»
14 years 9 months ago
Stream Monitoring under the Time Warping Distance
The goal of this paper is to monitor numerical streams, and to find subsequences that are similar to a given query sequence, under the DTW (Dynamic Time Warping) distance. Applica...
Yasushi Sakurai, Christos Faloutsos, Masashi Yamam...
KDD
2007
ACM
184views Data Mining» more  KDD 2007»
14 years 9 months ago
GraphScope: parameter-free mining of large time-evolving graphs
How can we find communities in dynamic networks of social interactions, such as who calls whom, who emails whom, or who sells to whom? How can we spot discontinuity timepoints in ...
Jimeng Sun, Christos Faloutsos, Spiros Papadimitri...
ICRA
2009
IEEE
170views Robotics» more  ICRA 2009»
14 years 3 months ago
Imitation learning with generalized task descriptions
— In this paper, we present an approach that allows a robot to observe, generalize, and reproduce tasks observed from multiple demonstrations. Motion capture data is recorded in ...
Clemens Eppner, Jürgen Sturm, Maren Bennewitz...
INFOCOM
2009
IEEE
14 years 3 months ago
On Mechanism Design without Payments for Throughput Maximization
—It is well-known that the overall efficiency of a distributed system can suffer if the participating entities seek to maximize their individual performance. Consequently, mecha...
Thomas Moscibroda, Stefan Schmid