Sciweavers

7486 search results - page 1433 / 1498
» The Limits of Quantum Computers
Sort
View
MIR
2010
ACM
191views Multimedia» more  MIR 2010»
14 years 2 months ago
Video retargeting with multi-scale trajectory optimization
Mobile devices are increasingly powerful in media storage and rendering. The prevalent request of decent video browsing on mobile devices is demanding. However, one limitation com...
Yuanning Li, YongHong Tian, Jingjing Yang, Ling-Yu...
DIALM
2007
ACM
178views Algorithms» more  DIALM 2007»
14 years 1 months ago
Near-Optimal Compression of Probabilistic Counting Sketches for Networking Applications
Sketches--data structures for probabilistic, duplicate insensitive counting--are central building blocks of a number of recently proposed network protocols, for example in the con...
Björn Scheuermann, Martin Mauve
EMNETS
2007
14 years 1 months ago
Robust node localization for wireless sensor networks
The node localization problem in Wireless Sensor Networks has received considerable attention, driven by the need to obtain a higher location accuracy without incurring a large, p...
Radu Stoleru, John A. Stankovic, Sang Hyuk Son
KDD
2010
ACM
235views Data Mining» more  KDD 2010»
14 years 1 months ago
Direct mining of discriminative patterns for classifying uncertain data
Classification is one of the most essential tasks in data mining. Unlike other methods, associative classification tries to find all the frequent patterns existing in the input...
Chuancong Gao, Jianyong Wang
ICB
2007
Springer
207views Biometrics» more  ICB 2007»
14 years 1 months ago
Super-Resolved Faces for Improved Face Recognition from Surveillance Video
Characteristics of surveillance video generally include low resolution and poor quality due to environmental, storage and processing limitations. It is extremely difficult for comp...
Frank Lin, Clinton Fookes, Vinod Chandran, Sridha ...
« Prev « First page 1433 / 1498 Last » Next »