Sciweavers

720 search results - page 128 / 144
» Evaluating Database Selection Techniques: A Testbed and Expe...
Sort
View
MM
2004
ACM
155views Multimedia» more  MM 2004»
14 years 1 months ago
Disruption-tolerant content-aware video streaming
Communication between a pair of nodes in the network may get disrupted due to failures of links/nodes resulting in zero effective bandwidth between them during the recovery perio...
Tiecheng Liu, Srihari Nelakuditi
CVPR
2011
IEEE
13 years 3 months ago
2D Nonrigid Partial Shape Matching Using MCMC and Contour Subdivision
Shape matching has many applications in computer vision, such as shape classification, object recognition, object detection, and localization. In 2D cases, shape instances are 2D c...
Y. Cao, Z. Zhang, I. Czogiel, I. Dryden, S. Wang
WWW
2011
ACM
13 years 2 months ago
Network bucket testing
Bucket testing, also known as A/B testing, is a practice that is widely used by on-line sites with large audiences: in a simple version of the methodology, one evaluates a new fea...
Lars Backstrom, Jon M. Kleinberg
ICPR
2004
IEEE
14 years 8 months ago
Illumination and Expression Invariant Face Recognition with One Sample Image
Most face recognition approaches either assume constant lighting condition or standard facial expressions, thus cannot deal with both kinds of variations simultaneously. This prob...
Brian C. Lovell, Shaokang Chen
KDD
2002
ACM
154views Data Mining» more  KDD 2002»
14 years 8 months ago
Mining Protein Contact Maps
The 3D conformation of a protein may be compactly represented in a symmetrical, square, boolean matrix of pairwise, inter-residue contacts, or "contact map". The contact...
Jingjing Hu, Xiaolan Shen, Yu Shao, Chris Bystroff...