Sciweavers

1941 search results - page 388 / 389
» The representation of planning strategies
Sort
View
ICPR
2010
IEEE
13 years 5 months ago
A Re-evaluation of Pedestrian Detection on Riemannian Manifolds
Abstract--Boosting covariance data on Riemannian manifolds has proven to be a convenient strategy in a pedestrian detection context. In this paper we show that the detection perfor...
Diego Tosato, Michela Farenzena, Marco Cristani, V...
CONSTRAINTS
2010
153views more  CONSTRAINTS 2010»
13 years 5 months ago
Philosophy of the MiniZinc challenge
MiniZinc arose as a response to the extended discussion at CP2006 of the need for a standard modelling language for CP. This is a challenging problem, and we believe MiniZinc makes...
Peter J. Stuckey, Ralph Becket, Julien Fischer
CIVR
2010
Springer
247views Image Analysis» more  CIVR 2010»
13 years 2 months ago
Coherent bag-of audio words model for efficient large-scale video copy detection
Current content-based video copy detection approaches mostly concentrate on the visual cues and neglect the audio information. In this paper, we attempt to tackle the video copy d...
Yang Liu, Wanlei Zhao, Chong-Wah Ngo, Changsheng X...
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 2 months ago
Exploiting Temporal Complex Network Metrics in Mobile Malware Containment
Malicious mobile phone worms spread between devices via short-range Bluetooth contacts, similar to the propagation of human and other biological viruses. Recent work has employed m...
John Tang, Cecilia Mascolo, Mirco Musolesi, Vito L...
SPAA
2009
ACM
14 years 8 months ago
Dynamic external hashing: the limit of buffering
Hash tables are one of the most fundamental data structures in computer science, in both theory and practice. They are especially useful in external memory, where their query perf...
Zhewei Wei, Ke Yi, Qin Zhang