Sciweavers

559 search results - page 85 / 112
» Isolation and Analysis of Optimization Errors
Sort
View
136
Voted
ICCV
2011
IEEE
14 years 3 months ago
Discriminative Learning of Relaxed Hierarchy for Large-scale Visual Recognition
In the real visual world, the number of categories a classifier needs to discriminate is on the order of hundreds or thousands. For example, the SUN dataset [24] contains 899 sce...
Tianshi Gao, Daphne Koller
ICCV
2007
IEEE
15 years 10 months ago
A Multi-Image Restoration Method for Image Reconstruction from Projections
in Proc. IEEE Int’l Conf. on Computer Vision (ICCV), October, 2007 Traditional Bayesian restoration methods depend heavily on the accuracy of underlying generative models. For t...
Yunqiang Chen, Lin Cheng, Tong Fang, Rainer Raupac...
130
Voted
USS
2008
15 years 6 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
TSP
2010
14 years 10 months ago
Randomized and distributed self-configuration of wireless networks: two-layer Markov random fields and near-optimality
Abstract--This work studies the near-optimality versus the complexity of distributed configuration management for wireless networks. We first develop a global probabilistic graphic...
Sung-eok Jeon, Chuanyi Ji
138
Voted
COCOA
2010
Springer
15 years 1 months ago
Bounds for Nonadaptive Group Tests to Estimate the Amount of Defectives
The classical and well-studied group testing problem is to find d defectives in a set of n elements by group tests, which tell us for any chosen subset whether it contains defectiv...
Peter Damaschke, Azam Sheikh Muhammad