Sciweavers

501 search results - page 100 / 101
» Rough Sets and Approximation Schemes
Sort
View
DATAMINE
2006
89views more  DATAMINE 2006»
13 years 7 months ago
Scalable Clustering Algorithms with Balancing Constraints
Clustering methods for data-mining problems must be extremely scalable. In addition, several data mining applications demand that the clusters obtained be balanced, i.e., be of ap...
Arindam Banerjee, Joydeep Ghosh
PAMI
2006
221views more  PAMI 2006»
13 years 7 months ago
Face Recognition from a Single Training Image under Arbitrary Unknown Lighting Using Spherical Harmonics
In this paper, we propose two novel methods for face recognition under arbitrary unknown lighting by using spherical harmonics illumination representation, which require only one t...
Lei Zhang 0002, Dimitris Samaras
MEDIAFORENSICS
2010
13 years 5 months ago
Biometric template transformation: a security analysis
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biom...
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain
TWC
2010
13 years 2 months ago
Optimized opportunistic multicast scheduling (OMS) over wireless cellular networks
Optimized opportunistic multicast scheduling (OMS) is studied for cellular networks, where the problem of efficiently transmitting a common set of fountain-encoded data from a sin...
Tze-Ping Low, Man-On Pun, Yao-Win Peter Hong, C.-C...
AAAI
2011
12 years 7 months ago
On Expressing Value Externalities in Position Auctions
Externalities are recognized to exist in the sponsored search market, where two co-located ads compete for user attention. Existing work focuses on the effect of another ad on th...
Florin Constantin, Malvika Rao, Chien-Chung Huang,...