Sciweavers

1822 search results - page 198 / 365
» Risk-Sensitive Online Learning
Sort
View
ICCV
2011
IEEE
12 years 8 months ago
Struck: Structured Output Tracking with Kernels
Adaptive tracking-by-detection methods are widely used in computer vision for tracking arbitrary objects. Current approaches treat the tracking problem as a classification task a...
Sam Hare, Amir Saffari, Philip H.S. Torr
WSDM
2012
ACM
296views Data Mining» more  WSDM 2012»
12 years 3 months ago
Inferring social ties across heterogenous networks
It is well known that different types of social ties have essentially different influence between people. However, users in online social networks rarely categorize their contact...
Jie Tang, Tiancheng Lou, Jon M. Kleinberg
ALT
2008
Springer
14 years 5 months ago
Exploiting Cluster-Structure to Predict the Labeling of a Graph
Abstract. The nearest neighbor and the perceptron algorithms are intuitively motivated by the aims to exploit the “cluster” and “linear separation” structure of the data to...
Mark Herbster
INFOCOM
2009
IEEE
14 years 2 months ago
Smart Trend-Traversal: A Low Delay and Energy Tag Arbitration Protocol for Large RFID Systems
—We propose a Smart Trend-Traversal (STT) protocol for RFID tag arbitration, which effectively reduces the collision overhead occurred in the arbitration process. STT, a Query Tr...
Lei Pan, Hongyi Wu
HICSS
2008
IEEE
122views Biometrics» more  HICSS 2008»
14 years 2 months ago
Pedagogy and Overview of a Graduate Program in Digital Investigation Management
Although still a relatively new undergraduate course of study at most colleges and universities, specialized degree programs in computer forensics and digital investigations are n...
Gary C. Kessler, Don Haggerty