Sciweavers

3238 search results - page 55 / 648
» Not Enough Points Is Enough
Sort
View
KDD
2006
ACM
130views Data Mining» more  KDD 2006»
14 years 9 months ago
Discovering significant rules
In many applications, association rules will only be interesting if they represent non-trivial correlations between all constituent items. Numerous techniques have been developed ...
Geoffrey I. Webb
CHI
2002
ACM
14 years 9 months ago
Out of many, one: reliable results from unreliable recognition
Recognition technologies such as speech recognition and optical recognition are still, by themselves. not reliable enough for many practical uses in user interfaces However, by co...
Henry Lieberman
CVPR
2010
IEEE
14 years 5 months ago
Unified Real-Time Tracking and Recognition with Rotation-Invariant Fast Features
We present a method that unifies tracking and video content recognition with applications to Mobile Augmented Reality (MAR). We introduce the Radial Gradient Transform (RGT) and ...
Gabriel Takacs, Vijay Chandrasekhar, Sam Tsai, Dav...
IPPS
2007
IEEE
14 years 3 months ago
Fault-Tolerant Earliest-Deadline-First Scheduling Algorithm
The general approach to fault tolerance in uniprocessor systems is to maintain enough time redundancy in the schedule so that any task instance can be re-executed in presence of f...
Hakem Beitollahi, Seyed Ghassem Miremadi, Geert De...
FSEN
2007
Springer
14 years 3 months ago
Formalizing Compatibility and Substitutability in Communication Protocols Using I/O-Constraint Automata
Abstract. A communication protocol consists of a sequence of messages used by peer entities to communicate. Each entity in a network is equipped by at least one protocol stack. Due...
Mahdi Niamanesh, Rasool Jalili