Sciweavers

5539 search results - page 12 / 1108
» What can be computed locally
Sort
View
ENTCS
2011
131views more  ENTCS 2011»
13 years 4 months ago
Computational Complexity in Non-Turing Models of Computation: The What, the Why and the How
We preliminarily recap what is meant by complexity and non-Turing computation, by way of explanation of our title, ‘Computational Complexity in Non-Turing Models of Computationâ...
Ed Blakey
CIVR
2008
Springer
106views Image Analysis» more  CIVR 2008»
13 years 11 months ago
Eye localization for face matching: is it always useful and under what conditions?
In this paper we address the influence of eye localization accuracy on face matching performance in the case of low resolution image and video content. By means of a broad experim...
Bart Kroon, Alan Hanjalic, Sander M. P. Maas
ICSM
2009
IEEE
14 years 4 months ago
What's hot and what's not: Windowed developer topic analysis
As development on a software project progresses, developers shift their focus between different topics and tasks many times. Managers and newcomer developers often seek ways of un...
Abram Hindle, Michael W. Godfrey, Richard C. Holt
CVPR
2011
IEEE
13 years 5 months ago
What You Saw is Not What You Get: Domain Adaptation Using Asymmetric Kernel Transforms
In real-world applications, “what you saw” during training is often not “what you get” during deployment: the distribution and even the type and dimensionality of features...
Brian Kulis, Kate Saenko, Trevor Darrell
INFOCOM
2008
IEEE
14 years 4 months ago
Towards a Theory of Robust Localization Against Malicious Beacon Nodes
—Localization in the presence of malicious beacon nodes is an important problem in wireless networks. Although signiïŹcant progress has been made on this problem, some fundament...
Sheng Zhong, Murtuza Jadliwala, Shambhu J. Upadhya...