Sciweavers

1866 search results - page 364 / 374
» Robust Algorithms and Price of Robustness in Shunting Proble...
Sort
View
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
12 years 11 months ago
Warding off the dangers of data corruption with amulet
Occasional corruption of stored data is an unfortunate byproduct of the complexity of modern systems. Hardware errors, software bugs, and mistakes by human administrators can corr...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...
CVPR
2008
IEEE
14 years 10 months ago
Learning Bayesian Networks with qualitative constraints
Graphical models such as Bayesian Networks (BNs) are being increasingly applied to various computer vision problems. One bottleneck in using BN is that learning the BN model param...
Yan Tong, Qiang Ji
ICCV
2007
IEEE
14 years 10 months ago
Coplanar Shadowgrams for Acquiring Visual Hulls of Intricate Objects
Acquiring 3D models of intricate objects (like tree branches, bicycles and insects) is a hard problem due to severe self-occlusions, repeated thin structures and surface discontin...
Shuntaro Yamazaki, Srinivasa G. Narasimhan, Simon ...
ECCV
2008
Springer
14 years 10 months ago
Differential Spatial Resection - Pose Estimation Using a Single Local Image Feature
Robust local image features have been used successfully in robot localization and camera pose estimation; region tracking using affine warps is considered state of the art also for...
Kevin Köser, Reinhard Koch
ICDE
2006
IEEE
201views Database» more  ICDE 2006»
14 years 10 months ago
Approximate Data Collection in Sensor Networks using Probabilistic Models
Wireless sensor networks are proving to be useful in a variety of settings. A core challenge in these networks is to minimize energy consumption. Prior database research has propo...
David Chu, Amol Deshpande, Joseph M. Hellerstein, ...