Sciweavers

1056 search results - page 19 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
JETAI
2006
63views more  JETAI 2006»
13 years 7 months ago
Principled exploitation of behavioural coupling
In robot building, attention tends to focus on internal signal processing and the way desired motor signals are generated. But equally important is the selection and configuration...
Chris Thornton
ICASSP
2011
IEEE
12 years 11 months ago
Exploiting an interplay between norms to analyze scalar quantization schemes
Quantization is intrinsic to several data acquisition systems. This process is especially important in distributed settings, where observations must rst be compressed before they ...
Parimal Parag, Jean-François Chamberland
CVPR
2008
IEEE
14 years 9 months ago
Selective hidden random fields: Exploiting domain-specific saliency for event classification
Classifying an event captured in an image is useful for understanding the contents of the image. The captured event provides context to refine models for the presence and appearan...
Vidit Jain, Amit Singhal, Jiebo Luo
ICDE
2004
IEEE
125views Database» more  ICDE 2004»
14 years 9 months ago
Range CUBE: Efficient Cube Computation by Exploiting Data Correlation
Data cube computation and representation are prohibitively expensive in terms of time and space. Prior work has focused on either reducing the computation time or condensing the r...
Ying Feng, Divyakant Agrawal, Amr El Abbadi, Ahmed...
GIS
2007
ACM
14 years 8 months ago
Exploiting automatically inferred constraint-models for building identification in satellite imagery
The building identification (BID) problem is based on a process that uses publicly available information to automatically assign addresses to buildings in satellite imagery. In pr...
Martin Michalowski, Craig A. Knoblock, Kenneth M. ...