Sciweavers

611 search results - page 115 / 123
» Knowledge Acquisition Evaluation Using Simulated Experts
Sort
View
ECCV
2004
Springer
13 years 11 months ago
Approximate Confidence Intervals for Estimation of Matching Error Rates of Biometric Identification Devices
Abstract. Assessing the matching error rates of a biometric identification devices is integral to understanding its performance. Here we propose and evaluate several methods for cr...
Travis J. Atkinson, Michael E. Schuckers
CCS
2011
ACM
12 years 7 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
3DIM
2005
IEEE
13 years 9 months ago
Bayesian Modelling of Camera Calibration and Reconstruction
Camera calibration methods, whether implicit or explicit, are a critical part of most 3D vision systems. These methods involve estimation of a model for the camera that produced t...
Rashmi Sundareswara, Paul R. Schrater
INFOCOM
2009
IEEE
14 years 2 months ago
Delay-Optimal Opportunistic Scheduling and Approximations: The Log Rule
—This paper considers the design of opportunistic packet schedulers for users sharing a time-varying wireless channel from the performance and the robustness points of view. Firs...
Bilal Sadiq, Seung Jun Baek, Gustavo de Veciana
ICC
2007
IEEE
127views Communications» more  ICC 2007»
13 years 11 months ago
Spectral Efficiency of Channel-Aware Schedulers in Non-Identical Composite Links with Interference
Accurate system planning and performance evaluation requires knowledge of the joint impact of scheduling, interference, and fading. However, current analyses either require costly...
Jingxian Wu, Neelesh B. Mehta, Andreas F. Molisch,...