Graphics Reference
In-Depth Information
9. Bilsen G, Engels M, Lauwereins R, Peperstraete JA (1996) Cyclo-static dataflow. IEEE Trans
Signal Process 44(2):397-408
10. Burges CJC (1998) A tutorial on support vector machines for pattern recognition. Knowl Discov
Data Min 2(2):121-167
11. Cherniack M, Balakrishnan H, Carney D, Cetintemel U, Xing Y, Zdonik S (2003) Scalable
distributed stream processing. In: CIDR
12. Chi Y, Yu PS, Wang H, Muntz RR (2005) Loadstar: a load shedding scheme for classifying
data streams. In: Proceedings of the SIAM conference on data mining
13. Darema F (2005) Grid computing and beyond: The context of dynamic data driven applications
systems. Proc IEEE 93(2):692-697
14. Ducasse R, Turaga D, van der Schaar M (2010) Adaptive topologic optimization for large-scale
stream mining. IEEE J Sel Top Sign Proces 4(3):620-636
15. EideV, Eliassen F, GranmoO, LysneO (2003) Supporting timeliness and accuracy in distributed
real-time content-based video analysis. In: Proceedings of the ACM international conference
on multimedia
16. Foo B, van der Schaar M (2010) A distributed approach for optimizing cascaded classifier
topologies in real-time stream mining systems. IEEE Trans Image Process 19(11):3035-3048
17. Foo B, Turaga D, Verscheure O, Amini L, van der Schaar M (2011) Configuring trees of
classifiers in distributed multimedia stream mining systems. IEEE Trans Circuits Syst Video
Technol 21(3):245-258
18. Fu F, Turaga D, Verscheure O, van der Schaar M, Amini L (2007) Configuring competing
classifier chains in distributed stream mining systems. IEEE J Sel Top Sign Process 1(4):548-
563
19. Garg A, Pavlovic V (2002) Bayesian networks as ensemble of classifiers. In: Proceedings of
the international conference on pattern recognition, pp 779-784
20. Georghiades AS, Belhumeur PN, Kriegman D (2001) From few to many: illumination cone
models for face recognition under variable lighting and pose. IEEE Trans Pattern Anal Mach
Intell 23(6):643-660
21. Girod B, Chandrasekhar V, Chen DM, Cheung N, Grzeszczuk R, Reznik Y, Takacs G, Tsai SS,
Vedantham R (2011) Mobile visual search. IEEE Signal Process Mag 28(4):61-76
22. Langford J, Zhang T (2008) The epoch-greedy algorithm for multi-armed bandits with side
information. In: Platt JC, Koller D, Singer Y, Roweis S (eds) Advances in neural information
processing systems. Curran Associates, New York, pp 817-824
23. Lee EA, Messerschmitt DG (1987) Synchronous dataflow. Proc IEEE 75(9):1235-1245
24. Lienhart R, Liang L, Kuranov A (2003) A detector tree for boosted classifiers for real-time
object detection and tracking. In: Proceedings of the IEEE international conference on multi-
media and expo
25. Li A, Yang X, Kandula S, Zhang M (2010) CloudCmp: comparing public cloud providers. In:
Proceedings of the ACM SIGCOMM conference on internet measurement, pp 1-14
26. Ntoulas A, NajorkM, ManasseM, FetterlyD (2006) Detecting spamweb pages through content
analysis. In: Proceedings of the international conference on world wide web
27. Olston C, Jiang J, Widom J (2003) Adaptive filters for continuous queries over distributed data
streams. In: ACM SIGMOD
28. Pang S (2004) SVM classification tree algorithm with application to face membership authen-
tication. In: Proceedings of the international joint conference on neural networks
29. Plishker W, Sane N, Kiemb M, Anand K, Bhattacharyya SS (2008) Functional DIF for rapid
prototyping. In: Proceedings of the international symposium on rapid system prototyping,
Monterey, California, pp 17-23
30. Ren S, van der Schaar M (2013) Efficient resource provisioning and rate selection for stream
mining in a community cloud. IEEE Trans Multimedia 15(4):723-734
31. Schapire RE (2003) The boosting approach to machine learning: an overview. In: Denison
DD, Hansen MH, Holmes C, Mallick B, Yu B (eds) Nonlinear estimation and classification.
Springer, New York
32. Siewiorek D (2012) Generation smartphone. IEEE Spectr Mag 49(9):54-58
Search WWH ::




Custom Search