Sciweavers

810 search results - page 123 / 162
» Modeling User Runtime Estimates
Sort
View
ICCV
2009
IEEE
15 years 2 months ago
Which Faces to Tag: Adding Prior Constraints into Active Learning
We introduce an algorithm that guides the user to tag faces in the best possible order during a face recognition assisted tagging scenario. In particular, we extend the active l...
Ashish Kapoor, Gang Hua, Amir Akbarzadeh and Simon...
WWIC
2009
Springer
119views Communications» more  WWIC 2009»
14 years 3 months ago
Handover Incentives for WLANs with Overlapping Coverage
Abstract. It is well known that in IEEE 802.11 networks, the assignment of low-rate and high-rate users to the same access point significantly degrades the performance of the high...
Xenofon Fafoutis, Vasilios A. Siris
IJAR
2010
151views more  IJAR 2010»
13 years 7 months ago
Envisioning uncertainty in geospatial information
Geospatial Reasoning has been an essential aspect of military planning since the invention of cartography. Although maps have always been a focal point for developing situational ...
Kathryn B. Laskey, Edward J. Wright, Paulo Cesar G...
ICDM
2009
IEEE
188views Data Mining» more  ICDM 2009»
13 years 6 months ago
Binomial Matrix Factorization for Discrete Collaborative Filtering
Matrix factorization (MF) models have proved efficient and well scalable for collaborative filtering (CF) problems. Many researchers also present the probabilistic interpretation o...
Jinlong Wu
KDD
2009
ACM
203views Data Mining» more  KDD 2009»
14 years 9 months ago
Characterizing individual communication patterns
The increasing availability of electronic communication data, such as that arising from e-mail exchange, presents social and information scientists with new possibilities for char...
R. Dean Malmgren, Jake M. Hofman, Luis A. N. Amara...