Sciweavers

1822 search results - page 335 / 365
» Risk-Sensitive Online Learning
Sort
View
113
Voted
ICCV
2005
IEEE
15 years 9 months ago
Fusing Points and Lines for High Performance Tracking
This paper addresses the problem of real-time 3D modelbased tracking by combining point-based and edge-based tracking systems. We present a careful analysis of the properties of t...
Edward Rosten, Tom Drummond
129
Voted
ICDAR
2005
IEEE
15 years 9 months ago
Fast Vector Matching Methods and Their Applications to Handwriting Recognition
A common practice in pattern recognition is to classify an unknown object by matching its feature vector with all the feature vectors stored in a database. When the number of clas...
Ying-Ho Liu, Wen-Hsiung Lin, Fu Chang, Chin-Chin L...
136
Voted
ATAL
2005
Springer
15 years 9 months ago
Agent-organized networks for dynamic team formation
Many multi-agent systems consist of a complex network of autonomous yet interdependent agents. Examples of such networked multi-agent systems include supply chains and sensor netw...
Matthew E. Gaston, Marie desJardins
121
Voted
COCO
2005
Springer
96views Algorithms» more  COCO 2005»
15 years 9 months ago
A Geometric Approach to Information-Theoretic Private Information Retrieval
A t-private private information retrieval (PIR) scheme allows a user to retrieve the ith bit of an n-bit string x replicated among k servers, while any coalition of up to t server...
David P. Woodruff, Sergey Yekhanin
123
Voted
DIGRA
2005
Springer
15 years 9 months ago
Pretty good for a girl: gender, identity and computer games
Young people’s participation in online digital culture is one of the most efficient means by which they become proficient in the management of Information and Communications Tec...
Catherine Beavis