Sciweavers

LATIN
2016
Springer
8 years 8 months ago
Chasing Convex Bodies and Functions
We consider three related online problems: Online Convex Optimization, Convex Body Chasing, and Lazy Convex Body Chasing. In Online Convex Optimization the input is an online seque...
Antonios Antoniadis, Neal Barcelo, Michael Nugent,...
LATIN
2016
Springer
8 years 8 months ago
Compressing Bounded Degree Graphs
Recently, Aravind, Sandeep, and Sivadasan (IPEC 2014) showed that for any finite set of connected graphs H, the problem H-Free Edge Deletion admits a polynomial kernelization on ...
Pål Grønås Drange, Markus S. Dr...
LATIN
2016
Springer
8 years 8 months ago
Stabbing Circles for Sets of Segments in the Plane
:00 Simple realizability of complete abstract topological graphs simplified. Jan Kynˇcl. 11:00-11:30 Coffee break · · · · · · · · · · · · · · · · · · · · · ...
Mercè Claverol, Elena Khramtcova, Evanthia ...
LATIN
2016
Springer
8 years 8 months ago
A Faster FPT Algorithm and a Smaller Kernel for Block Graph Vertex Deletion
A graph G is called a block graph if each maximal 2-connected component of G is a clique. In this paper we study the Block Graph Vertex Deletion from the perspective of fixed para...
Akanksha Agrawal, Sudeshna Kolay, Daniel Lokshtano...
IDA
2016
Springer
8 years 8 months ago
Using a Human Drug Network for generating novel hypotheses about drugs
Hossein Rahmani, Hendrik Blockeel, Andreas Bender
ICUIMC
2016
ACM
8 years 8 months ago
Coalitional Game Theoretic Approach for Cooperation in Heterogeneous Cognitive Wireless Networks
Heterogeneous cognitive wireless networks (HeCoNets)) are consisted of macrocells that are overlaid by small cells (e.g, femtocells, picocells). These small cells operate over the...
Tuan LeAnh, Saeed Ullah, Nguyen H. Tran, Sung Soo ...
ICUIMC
2016
ACM
8 years 8 months ago
A Real-time Facial Expression Recognizer using Deep Neural Network
With increasing boundaries of deep learning based recognition model, particular demands for real-time user state recognizer targeting smart home devices have emerged. This paper s...
Jinwoo Jeon, Jun-Cheol Park, Youngjoo Jo, Changmo ...
ICUIMC
2016
ACM
8 years 8 months ago
Threat Assessment in the Cloud Environment: A Quantitative Approach for Security Pattern Selection
Cloud computing has emerged as a fast-growing technology in the past few years. It provides a great flexibility for storing, sharing and delivering data over the Internet without...
Priya Anand, Jungwoo Ryoo, Hyoungshick Kim, Eunhyu...
ICUIMC
2016
ACM
8 years 8 months ago
A Real-time Object Tracker equipped with Deep Object Recognizer
A novel system for intelligent visual tracking focus on the unknown object tracking in short or mid-term video stream of the object in unconstrained environment. Also it commonly ...
Youngjoo Jo, Jun-Cheol Park, Jinwoo Jeon, Changmo ...