Sciweavers

643 search results - page 103 / 129
» Experiments with Nonholonomic Manipulation
Sort
View
CVPR
2010
IEEE
13 years 10 months ago
Learning kernels for variants of normalized cuts: Convex relaxations and applications
We propose a new algorithm for learning kernels for variants of the Normalized Cuts (NCuts) objective – i.e., given a set of training examples with known partitions, how should ...
Lopamudra Mukherjee, Vikas Singh, Jiming Peng, Chr...
ICASSP
2010
IEEE
13 years 10 months ago
A nonnegative sparsity induced similarity measure with application to cluster analysis of spam images
Image spam is an email spam that embeds text content into graphical images to bypass traditional spam filters. The majority of previous approaches focus on filtering image spam ...
Yan Gao, Alok N. Choudhary, Gang Hua
ICASSP
2010
IEEE
13 years 10 months ago
Search-Based Automatic Image Annotation via Flickr Photos Using Tag Expansion
Exponentially growing photo collections motivate the needs for automatic image annotation for effective manipulations (e.g., search, browsing). Most of the prior works rely on sup...
Liang-Chi Hsieh, Winston H. Hsu
C5
2007
IEEE
13 years 10 months ago
DR. GEO II: Adding Interactivity Planes in Interactive Dynamic Geometry
Interactive geometry environments support the creation and exploitation of interactive geometric sketches. However, such environments are often driven in a rigid manner, following...
Hilaire Fernandes, Stéphane Ducasse, Thibau...
CN
2007
80views more  CN 2007»
13 years 9 months ago
Receiver-centric congestion control with a misbehaving receiver: Vulnerabilities and end-point solutions
Receiver-driven TCP protocols delegate key congestion control functions to receivers. Their goal is to exploit information available only at receivers in order to improve latency ...
Aleksandar Kuzmanovic, Edward W. Knightly