Sciweavers

2109 search results - page 367 / 422
» Solving Necklace Constraint Problems
Sort
View
83
Voted
TON
1998
68views more  TON 1998»
15 years 8 days ago
Optimal capacity placement for path restoration in STM or ATM mesh-survivable networks
Abstract—The total transmission capacity required by a transport network to satisfy demand and protect it from failures contributes significantly to its cost, especially in long...
Rainer R. Iraschko, Mike H. MacGregor, Wayne D. Gr...
111
Voted
CORR
2010
Springer
131views Education» more  CORR 2010»
14 years 11 months ago
Ideal forms of Coppersmith's theorem and Guruswami-Sudan list decoding
: We develop a framework for solving polynomial equations with size constraints on solutions. We obtain our results by showing how to apply a technique of Coppersmith for finding ...
Henry Cohn, Nadia Heninger
DIS
2010
Springer
14 years 11 months ago
Mining Class-Correlated Patterns for Sequence Labeling
Sequence labeling is the task of assigning a label sequence to an observation sequence. Since many methods to solve this problem depend on the specification of predictive features...
Thomas Hopf, Stefan Kramer
120
Voted
GLOBECOM
2010
IEEE
14 years 10 months ago
Prolonging Network Lifetime via a Controlled Mobile Sink in Wireless Sensor Networks
In this paper we explore the mobility of a mobile sink in a wireless sensor network (WSN) to prolong the network lifetime. Since the mechanical movement of mobile sink is driven by...
Weifa Liang, Jun Luo, Xu Xu
130
Voted
CVPR
2003
IEEE
16 years 2 months ago
Shape-From-Silhouette of Articulated Objects and its Use for Human Body Kinematics Estimation and Motion Capture
Shape-From-Silhouette (SFS), also known as Visual Hull (VH) construction, is a popular 3D reconstruction method which estimates the shape of an object from multiple silhouette ima...
German K. M. Cheung, Simon Baker, Takeo Kanade