Sciweavers

234 search results - page 25 / 47
» Algorithmic Power from Declarative Use of Redundant Constrai...
Sort
View
JMLR
2008
100views more  JMLR 2008»
13 years 7 months ago
Hit Miss Networks with Applications to Instance Selection
In supervised learning, a training set consisting of labeled instances is used by a learning algorithm for generating a model (classifier) that is subsequently employed for decidi...
Elena Marchiori
MOBICOM
2010
ACM
13 years 7 months ago
Intentional networking: opportunistic exploitation of mobile network diversity
Mobile devices face a diverse and dynamic set of networking options. Using those options to the fullest requires knowledge of application intent. This paper describes Intentional ...
Brett D. Higgins, Azarias Reda, Timur Alperovich, ...
HICSS
2002
IEEE
89views Biometrics» more  HICSS 2002»
14 years 17 days ago
Nash Strategies for Load Serving Entities in Dynamic Energy Multi-markets
In this paper the problem of developing bidding strategies for the participants of dynamic energy-multi markets is studied. Attention is given to strategic bidding of load serving...
Jose B. Cruz Jr., Ashkan Kian
MOBICOM
2009
ACM
14 years 8 days ago
Understanding cross-band interference in unsynchronized spectrum access
We consider the problem of cross-band interference when devices from the same or different networks share radio spectrum. Cross-band interference occurs when unsynchronized trans...
Wei Hou, Lei Yang, Lin Zhang, Xiuming Shan, Heathe...
ACCV
2009
Springer
14 years 2 months ago
A Probabilistic Model for Correspondence Problems Using Random Walks with Restart
Abstract. In this paper, we propose an efficient method for finding consistent correspondences between two sets of features. Our matching algorithm augments the discriminative pow...
Tae Hoon Kim, Kyoung Mu Lee, Sang Uk Lee