Sciweavers

950 search results - page 101 / 190
» Modified global k
Sort
View
SIAMDM
2010
149views more  SIAMDM 2010»
13 years 8 months ago
Formal Theory of Noisy Sensor Network Localization
Graph theory has been used to characterize the solvability of the sensor network localization problem. If sensors correspond to vertices and edges correspond to sensor pairs betwee...
Brian D. O. Anderson, Iman Shames, Guoqiang Mao, B...
MICCAI
2008
Springer
14 years 11 months ago
Spherical Demons: Fast Surface Registration
Abstract. We present the fast Spherical Demons algorithm for registering two spherical images. By exploiting spherical vector spline interpolation theory, we show that a large clas...
B. T. Thomas Yeo, Mert R. Sabuncu, Tom Vercauter...
ICPR
2006
IEEE
14 years 11 months ago
Bayesian Feedback in Data Clustering
In many clustering applications, the user has some vague notion of the number and membership of the desired clusters. However, it is difficult for the user to provide such knowled...
Anil K. Jain, Pavan Kumar Mallapragada, Martin H. ...
ICPR
2000
IEEE
14 years 11 months ago
Feature Relevance Learning with Query Shifting for Content-Based Image Retrieval
Probabilistic feature relevance learning (PFRL) is an effective technique for adaptively computing local feature relevance for content-based image retrieval. It however becomes le...
Douglas R. Heisterkamp, Jing Peng, H. K. Dai
WWW
2007
ACM
14 years 10 months ago
Defeating script injection attacks with browser-enforced embedded policies
Web sites that accept and display content such as wiki articles or comments typically filter the content to prevent injected script code from running in browsers that view the sit...
Trevor Jim, Nikhil Swamy, Michael Hicks