Sciweavers

12333 search results - page 2255 / 2467
» System Level Modelling for Hardware Software Systems
Sort
View
136
Voted
WINET
2010
121views more  WINET 2010»
15 years 1 months ago
Transmission algorithm for video streaming over cellular networks
2.5G and 3G cellular networks are becoming more and more widespread. Therefore, the need for value added services is increasing rapidly. One of the key services that operators see...
Y. Falik, A. Averbuch, U. Yechiali
100
Voted
BMVC
2010
15 years 20 days ago
Electoral College and Direct Popular Vote for Multi-Candidate Election
We introduce a stability analysis model for multi-candidate regional and national voting schemes (aka Electoral College and Direct Popular Vote, respectively), which can be expres...
Liang Chen
141
Voted
IJCV
2011
264views more  IJCV 2011»
14 years 9 months ago
Cost-Sensitive Active Visual Category Learning
Abstract We present an active learning framework that predicts the tradeoff between the effort and information gain associated with a candidate image annotation, thereby ranking un...
Sudheendra Vijayanarasimhan, Kristen Grauman
116
Voted
SIAMADS
2010
105views more  SIAMADS 2010»
14 years 9 months ago
Nonlinear Patterns in Urban Crime: Hotspots, Bifurcations, and Suppression
We present a weakly nonlinear analysis of our recently developed model for the formation of crime patterns. Using a perturbative approach, we find amplitude equations that govern t...
Martin B. Short, Andrea L. Bertozzi, P. J. Brantin...
131
Voted
ICASSP
2011
IEEE
14 years 6 months ago
Authentication of fingerprint scanners
Fingerprint scanners have unique patterns that can be used to distinguish one scanner from another one. The pattern, which we call scanner pattern, stems from the variability of d...
Vladimir I. Ivanov, John S. Baras
« Prev « First page 2255 / 2467 Last » Next »