Sciweavers

831 search results - page 122 / 167
» Interesting Patterns Extraction Using Prior Knowledge
Sort
View
IROS
2006
IEEE
274views Robotics» more  IROS 2006»
14 years 2 months ago
Adaptive Scale Robust Segmentation for 2D Laser Scanner
Abstract— This paper presents a robust algorithm for segmentation and line detection in 2D range scans. The described method exploits the multimodal probability density function ...
Ruben Martinez-Cantin, José A. Castellanos,...
ICML
2010
IEEE
13 years 9 months ago
Tree-Guided Group Lasso for Multi-Task Regression with Structured Sparsity
We consider the problem of learning a sparse multi-task regression, where the structure in the outputs can be represented as a tree with leaf nodes as outputs and internal nodes a...
Seyoung Kim, Eric P. Xing
COMCOM
2010
276views more  COMCOM 2010»
13 years 8 months ago
Adjustable convergecast tree protocol for wireless sensor networks
For data-collection applications in sensor networks, it is important to ensure base station receives a complete picture about the monitored area. Convergecast is an important commu...
Tzung-Shi Chen, Hua-Wen Tsai, Chih-Ping Chu
TMC
2011
137views more  TMC 2011»
13 years 2 months ago
Cognitive Medium Access: Exploration, Exploitation, and Competition
— This paper establishes the equivalence between cognitive medium access and the competitive multi-armed bandit problem. First, the scenario in which a single cognitive user wish...
Lifeng Lai, Hesham El Gamal, Hai Jiang, H. Vincent...
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
14 years 2 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode