Sciweavers

119 search results - page 20 / 24
» Explore Exploit Schemes for Web Content Optimization
Sort
View
AINA
2006
IEEE
14 years 1 months ago
Adaptive Timeout Policies for Wireless Links
— A considerable body of evidence indicates that the use of reliable link layer protocols over error prone wireless links dramatically improves the performance of Internet protoc...
George Xylomenos, Christos Tsilopoulos
SIGIR
2010
ACM
13 years 11 months ago
Adaptive near-duplicate detection via similarity learning
In this paper, we present a novel near-duplicate document detection method that can easily be tuned for a particular domain. Our method represents each document as a real-valued s...
Hannaneh Hajishirzi, Wen-tau Yih, Aleksander Kolcz
CVPR
2011
IEEE
12 years 11 months ago
Tag Localization with Spatial Correlations and Joint Group Sparsity
Nowadays numerous social images have been emerging on the Web. How to precisely label these images is critical to image retrieval. However, traditional image-level tagging methods...
Yang Yang, Yi Yang, Zi Huang, Heng Tao Shen, Feipi...
INFOCOM
2000
IEEE
13 years 12 months ago
Energy Efficient Battery Management
Abstract—A challenging aspect of mobile communications consists in exploring ways in which the available run time of terminals can be maximized. In this paper, we present a detai...
Carla-Fabiana Chiasserini, Ramesh R. Rao
MM
2009
ACM
203views Multimedia» more  MM 2009»
14 years 7 days ago
Distance metric learning from uncertain side information with application to automated photo tagging
Automated photo tagging is essential to make massive unlabeled photos searchable by text search engines. Conventional image annotation approaches, though working reasonably well o...
Lei Wu, Steven C. H. Hoi, Rong Jin, Jianke Zhu, Ne...