Sciweavers

41 search results - page 3 / 9
» bell 2010
Sort
View
SIGIR
2010
ACM
13 years 10 months ago
Active learning for ranking through expected loss optimization
Bo Long, Olivier Chapelle, Ya Zhang, Yi Chang, Zha...
TIFS
2010
171views more  TIFS 2010»
13 years 1 months ago
A method for automatic identification of signatures of steganography software
Abstract--A fully automated, blind, media-type agnostic approach to steganalysis is presented here. Steganography may sometimes be exposed by detecting automatically characterized ...
Graeme Bell, Yeuan-Kuen Lee
KSEM
2010
Springer
13 years 5 months ago
A Comparison of Merging Operators in Possibilistic Logic
Abstract. In this paper, we compare merging operators in possibilistic logic. We first propose an approach to evaluating the discriminating power of a merging operator. After that...
Guilin Qi, Weiru Liu, David A. Bell
IJRR
2010
84views more  IJRR 2010»
13 years 5 months ago
Grasping Non-stretchable Cloth Polygons
In this paper, we examine non-stretchable 2D polygonal cloth, and place bounds on the number of fingers needed to immobilize it. For any non-stretchable cloth polygon, it is alwa...
Matthew P. Bell, Devin J. Balkcom
ICMCS
2010
IEEE
156views Multimedia» more  ICMCS 2010»
13 years 8 months ago
Noise cancellation: Disrupting audio perception
ph is an abstracted flattened version of the view, just as the sound being emitted speakers is an abstracted and distorted version of that which is being recorded 1 K Goldsmith, `B...
Cara-Ann Simpson, Eva Cheng