Sciweavers

1390 search results - page 198 / 278
» Streaming Algorithms Measured in Terms of the Computed Quant...
Sort
View
MM
2006
ACM
119views Multimedia» more  MM 2006»
14 years 2 months ago
Model generation for video-based object recognition
This paper presents a novel approach to object recognition involving a sparse 2D model and matching using video. The model is generated on the basis of geometry and image measurab...
Humera Noor, Shahid H. Mirza, Yaser Sheikh, Amit J...
MM
2005
ACM
78views Multimedia» more  MM 2005»
14 years 2 months ago
Validating cardiac echo diagnosis through video similarity
Video data is increasingly being used in medical diagnosis. Due to the quality of the video and the complexities of underlying motion captured, it is difficult for an in-experienc...
Tanveer Fathima Syeda-Mahmood, Dulce B. Ponceleon,...
MSWIM
2005
ACM
14 years 2 months ago
YAES: a modular simulator for mobile networks
Developing network protocols for mobile wireless systems is a complex task, and most of the existing simulator frameworks are not well suited for experimental development. The YAE...
Ladislau Bölöni, Damla Turgut
MM
2009
ACM
233views Multimedia» more  MM 2009»
14 years 1 months ago
Enhancing semantic and geographic annotation of web images via logistic canonical correlation regression
Photo community sites such as Flickr and Picasa Web Album host a massive amount of personal photos with millions of new photos uploaded every month. These photos constitute an ove...
Liangliang Cao, Jie Yu, Jiebo Luo, Thomas S. Huang
AAAI
2008
13 years 11 months ago
Reinforcement Learning for Vulnerability Assessment in Peer-to-Peer Networks
Proactive assessment of computer-network vulnerability to unknown future attacks is an important but unsolved computer security problem where AI techniques have significant impact...
Scott Dejmal, Alan Fern, Thinh Nguyen