Sciweavers

1995 search results - page 92 / 399
» What's the Problem
Sort
View
DATAMINE
2007
97views more  DATAMINE 2007»
15 years 3 months ago
Mining for trigger events with survival analysis
This paper discusses a new application of data mining, quantifying the importance of responding to trigger events with reactive contacts. Trigger events happen during a customer’...
Edward C. Malthouse
AUTOMATICA
2004
77views more  AUTOMATICA 2004»
15 years 3 months ago
Non-asymptotic quality assessment of generalised FIR models with periodic inputs
In any real-life identification problem, only a finite number of data points is available. On the other hand, almost all results in stochastic identification pertain to asymptotic...
Marco C. Campi, Su Ki Ooi, Erik Weyer
127
Voted
ICCV
2003
IEEE
16 years 5 months ago
Camera Calibration with Known Rotation
We address the problem of using external rotation information with uncalibrated video sequences. The main problem addressed is, what is the benefit of the orientation information ...
Jan-Michael Frahm, Reinhard Koch
PDPTA
2000
15 years 5 months ago
Parallel Real-Time Cryptography: Beyond Speedup II
The primary purpose of parallel computation is the fast execution of computational tasks that are too slow to perform sequentially. However, it was shown recently that a second eq...
Selim G. Akl, Stefan D. Bruda
INFOCOM
2008
IEEE
15 years 10 months ago
Towards a Theory of Robust Localization Against Malicious Beacon Nodes
—Localization in the presence of malicious beacon nodes is an important problem in wireless networks. Although significant progress has been made on this problem, some fundament...
Sheng Zhong, Murtuza Jadliwala, Shambhu J. Upadhya...