Sciweavers

15781 search results - page 2911 / 3157
» Evaluating Information Extraction
Sort
View
140
Voted
TON
2012
13 years 7 months ago
Opportunistic Spectrum Access in Multiple-Primary-User Environments Under the Packet Collision Constraint
—Cognitive Radio (CR) technology has great potential to alleviate spectrum scarcity in wireless communications. It allows secondary users (SUs) to opportunistically access spectr...
Eric Jung, Xin Liu
TON
2012
13 years 7 months ago
On New Approaches of Assessing Network Vulnerability: Hardness and Approximation
—Society relies heavily on its networked physical infrastructure and information systems. Accurately assessing the vulnerability of these systems against disruptive events is vit...
Thang N. Dinh, Ying Xuan, My T. Thai, Panos M. Par...
181
Voted
CVPR
2012
IEEE
13 years 7 months ago
Augmenting deformable part models with irregular-shaped object patches
The performance of part-based object detectors generally degrades for highly flexible objects. The limited topological structure of models and pre-specified part shapes are two ...
Roozbeh Mottaghi
185
Voted
CVPR
2012
IEEE
13 years 7 months ago
RALF: A reinforced active learning formulation for object class recognition
Active learning aims to reduce the amount of labels required for classification. The main difficulty is to find a good trade-off between exploration and exploitation of the lab...
Sandra Ebert, Mario Fritz, Bernt Schiele
ISCA
2012
IEEE
237views Hardware» more  ISCA 2012»
13 years 7 months ago
BOOM: Enabling mobile memory based low-power server DIMMs
To address the real-time processing needs of large and growing amounts of data, modern software increasingly uses main memory as the primary data store for critical information. T...
Doe Hyun Yoon, Jichuan Chang, Naveen Muralimanohar...
« Prev « First page 2911 / 3157 Last » Next »