# Research Publications

 Search | Show all All2009 Narrow your search « 1 2 3 4 5 ... 7 8 »Results per Page 10 25 50 100 250713 result(s) By TypeConference Paper (426)Journal Publication (160)Book Chapter (26)Technical Report (19)Other Conference Presentation (18)By YearShow all yearsBy Research GroupControl and Signal Processing (37)Machine Learning (33)Computer Vision (16)Optics and Nano Electronics (11)Networks (10)Software Systems (6)Optimisation (1) J. Bernal, T. Dix, Lloyd AllisonArtificial Life: Borrowing from Biology - November 2009 Tim Baldwin, J. Manuel Paul Anil Kumar22nd Australian Joint Conference on Artificial Intelligence (AI09) - November 2009 W. Webber, Alistair Moffat, , Justin Zobel, T. ArmstrongInternational ACM-CIKM Conference on Information and Knowledge Management - November 2009 W. Yap, Tim BaldwinUniversity of Melbourne - 2009 David Smith, Andrew Zhang, Leif Hanlen, Dino Miniutti, David Rodda, Ben GilbertTemporal autocorrelation of the dynamic on-body radio channel is characterized empirically and theoretically based on measurements. The channel coherence time is found to be approximately 20 to 70~ms for a human subject either walking or running. Using a ...IET Electronics Letter - November 2009 Marcus Hutter, Nathan Brewer, Rakib AhmedProceedings of Image and Vision Computing New Zealand - November 2009 Dino Miniutti, David Smith, Leif Hanlen, Andrew Zhang, David Rodda, Ben Gilbert300+ hours of sleeping BAN channel measurements with characterisation of data in terms of outages with respect to receiver sensitivity. Showing that channel outages are greater than 10% with -100 dBm receiver sensitivity.IEEE802.15.6 - November 2009 Willy Yap, Tim BaldwinRelation extraction is the task of extracting semantic relations— such as synonymy or hypernymy—between word pairs from corpus data. Past work in relation extraction has concentrated on manually creating templates to use in directly extracting word pairs ...18th ACM Conference on Information and Knowledge Management (CIKM 2009) - November 2009 Petar Rajkovic, Dragan Jankovic, Vladimir TosicDuring the last decade, the Ministry of Health of the Republic of Serbia, a developing country, funded several projects aiming to make the public healthcare system more efficient through the use of information technology (IT). This system development ...11th International Conference on e-Health Networking, Application and Services (Healthcom2009) - December 2009 In this paper, we study the transmission power to secure connectivity of a network. Instead of requiring all nodes to be connected, we require only that a large fraction (e.g. 95%) be connected, termed the giant component. We show that with this ...IEEE Transactions on Vehicular Technology - 10 2009 Chen Cai, Bernhard Hengst, Getian Ye, Enyang Huang, Yang Wang, Carlos Aydos, Glenn GeersIn this paper, we present a study in understanding sensing error’s impact on traffic signal control performance. Adaptive traffic signal control systems depend on information from traffic sensors to interpret the state of traffic. Signal timings are ...17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems - November 2009 Novi Quadrianto, Alex J. Smola, Tiberio Caetano, Quoc LeConsider the following problem: given sets of unlabeled observations, each set with known label proportions, predict the labels of another set of observations, possibly with known label propor- tions. This problem occurs in areas like e-commerce, ...Journal of Machine Learning Research - November 2009 Jun Yang, Yang Wang, Getian Ye, Arcot Sowmya, Matt (Bang) Zhang, Jie XuIn this paper, we formulate the feature clustering problem as a general Bayesian model and solve it using MCMC. The proposed approach exhibits two advantages over existing methods: Bayesian model handles arbitrary objective functions and MCMC guarantees ...International Conference on Image Processing - November 2009 Vikas Reddy, Conrad Sanderson, Brian LovellMany computer vision algorithms such as object tracking and event detection assume that a background model of the scene under analysis is known. However, in many practical circumstances it is unavailable and needs to be estimated from cluttered image ...IEEE International Conference on Image Processing - November 2009 Ildiko Horvath, Brian C. LovellThis study investigates the effects of November superstorms on the daytime-evening northern topside ionosphere. We utilize multi-instrument interplanetary and geomagnetic data to analyze the interplanetary shock/electric (E) field events. To assess their ...Journal of Geophysical Research - Space Physics - November 2009 Anirban Mahanti, Garg Sanchit, Trinabh Gupta, Niklas CarlssonTendency of individuals to develop relationships with similar individuals, to form relationships based on mutual acquaintances and proximity, and to form relationships based on common interests are documented in the social science literature as ...SIGCOMM Internet Measurement Conference - November 2009 This paper presents the design and implementation of SPINdle - a defeasible logic reasoner that is capable to perform efficient and scalable reasoning on defeasible logic theories (including theories with over 1 million rules). The implementation ...RuleML-2009 International Symposium on Rule Interchange and Applications - Nov 2009 Franz Baader, Andreas Bauer, Alwen Tiu3rd International Conference on Language and Automata Theory and Applications (LATA) - April 2009 Michael Vistein, Frank Ortmeier, Wolfgang Reif, Ralf Huuck, Ansgar FehnkerStatic program analysers typically come with a set of hard-coded checks, leaving little room for the user to add additional properties. In this work, we present a uniform approach to enable the speci cation of new static analysis checks in a concise ...4th International Workshop on Systems Software Verification (SSV'09) - February 2009 Brian Lam, Subhasis Thakur, Guido Governatori, Abdul SattarIn this paper we show how a non-monotonic rule based system (defeasible logic) can be integrated with numerical computation engines. To this end we simulate a physical system from which we obtain numerical information. The physical system perceives ...The 3rd International Rule Challenge - Nov 2009 Penelope Sanderson, David Liu, Simon JenkinsPurpose of review. We outline and discuss recent work on auditory displays, covering both auditory alarms that indicate technical or physiological threshold levels, and informative auditory displays that provide a continuous awareness of a patient’s ...Current Opinion in Anesthesiology - December 2009 David Liu, Simon Jenkins, Penelope SandersonPurpose of review. Head-mounted displays (HMDs) are head-worn display devices that project an information display over the wearer’s field of view. This article reviews a recent program of research that investigates the advantages and disadvantages of ...Current Opinion in Anesthesiology - December 2009 Wray BuntineTopic models are a discrete analogue to principle component analysis and independent component analysis that model {\it topic} at the word level within a document. They have many variants such as NMF, PLSI and LDA, and are used in many fields such as ...Asian Conference on Machine Learning - November 2009 SuNam Kim, Tim Baldwin, M-Y Kan2009 Australasian Language Technology Workshop (ALTW 2009) - December 2009 John Slaney, A AnbulaganCNF simplifiers play a very important role in minimising structured problem hardness. Altough they can be used in an in-search process, most of them serve in a pre-search phase and are developed based on the old resolution procedure. Based on our ...21st International Conference on Tools with Artificial Intelligence (ICTAI) - November 2009 Guido Governatori, Guido Governatori, Antonino RotoloIn this survey paper we summarize the requirements for rule interchange languages for applications in the legal domain and use these requirements to evaluate RuleML, SBVR, SWRL and RIF. We also present the Legal Knowledge Interchange Format (LKIF), a new ...RuleML-2009 International Symposium on Rule Interchange and Applications - November 2009 Michael MaherWe extend the framework of Constraint Satisfaction Problems to make it more suitable for/applicable to modern constraint programming languages where both constraint satisfaction and constraint solving have a role. Some rough principles for local ... - July 2009 Sarvnaz Karimi, Justin Zobel, Stefan Pohl, Falk ScholerClinical systematic reviews are based on expert, laborious search of well-annotated literature. Boolean search on bibliographic databases, such as MEDLINE, continues to be the preferred discovery method, but the size of these databases, now approaching ...ACM Third International Workshop on Data and Text Mining in Bioinformatics (DTMBIO 2009) - November 2009 Paul Zhang, Yongsheng GaoOne of the major challenges encountered by current face recognition techniques lies in the difficulties of handling varying poses, i.e., recognition of faces in arbitrary in-depth rotations. The face image differences caused by rotations are often ...Pattern Recognition - November 2009 Kong SuyuIn this book, we describe the proposed pedestrian classification and tracking system that is able to track and label multiple people in an outdoor environment such as a railway station. We propose an approach that combines blob matching with particle ... - August 2009 Yang Yang, Honglin Hu, Jing Xu, Guoqiang MaoRelay technologies have been actively studied and considered in the standardization process of next generation mobile broadband communication systems. This paper first introduces and compares different relay types in 3GPP LTE-Advanced and WiMAX standards....IEEE Communications Magazine - Oct 2009 renato iannellaThe Policy-Aware Web is the promise for supporting semantic policy management at the Web infrastructure level. A policy is any set of rules or statements that capture and express the re- quirements of individuals and organisations from a corporate, legal,...NICTA - 2009 Andrew BoytonThis paper presents a high-level access control model of the seL4 microkernel. We extend an earlier formalisation by Elkaduwe et al with non-determinism, explicit sharing of capability storage, and a delete-operation for entities. We formally prove ...4th International Workshop on Systems Software Verification - June 2009 Franck CassezThis short note explains how to install PHAVer (and the needed libraries) for a single user on Mac OS X running Leopard (10.5.6). It might also work for earlier versions (you can report to me in ...NICTA - March 2009 Franck Cassez, Jérémy Dubreil, Hervé MarchandIn this paper, we address the problem of synthesizing \emph{opaque} systems. A secret predicate $S$ over the runs of a system $G$ is \emph{opaque} to an external user having partial observability over $G$, if s/he can never infer from the ...IRISA - May 2009 Gilles Benattar, Franck Cassez, Didier Lime, Olivir Henri RouxIn this paper, we focus on the synthesis of secure timed systems which are given by timed automata. The security property that the system must satisfy is a \emph{non-interference} property. Various notions of non-interference have been ...Proc. of the 7th Int. Conf. on Formal Modeling and Analysis of Timed Systems (FORMATS'09) - September 2009 Ralf Huuck, Brauer Joerg, Schlich Bastian Goanna is an industrial-strength static analysis tool used in academia and industry alike to find bugs in C/C++ programs. Unlike existing approaches, Goanna uses the off-the-shelf model checker NuSMV as its core analysis engine on a syntactic ...4th International Workshop on Systems Software Verification (SSV'09) - June 2009 Roksana Boreli, Ge Yu, Thava Iyer, Christoph Dwertmann, Shankar PathmasuntharamWe provide an overview of a Maritime Intelligent Transport System (ITS) which consists of a high speed maritime mesh network, satellite communications and middleware components. The work is an outcome of a collaboration project between I$^{\textrm{\...ITST 9th International Conference on ITS Telecommunications - October 2009 Modern mobile devices are increasingly capable of simultaneously connecting to multiple access networks with different characteristics. Restricted coverage combined with user mobility will vary the availability of networks for a mobile device. Most ...MSWiM - October 2009 Bjorn Landfeldt, Suparerk Manitpornsut, Azzedine BoukercheIt is well known that WLAN based on the IEEE 802.11 stan- dard suﬀers from interference and scalability problems due to a limited number of non-overlapping channels. In order to mitigate the interference problem, channel assignment al- gorithms ...MSWiM - October 2009 Thanassis Boulis, Yuri TselishchevThe Road and Traffic Authority (RTA) of NSW, partnered with NICTA, are looking into wireless sensor network technologies to monitor the structural health of bridges. The task involves exploring different sensing, networking, and distributed computation ...IEEE Sensors - October 2009 Franck Cassez, Nicolas MarkeyIn this book Chapter we address the problem of controller synthesis for timed systems. By timed systems we refer to systems which are subject to quantitative (hard) real-time constraints. We assume the reader is familiar with the basics of Timed ...Communicating Embedded Systems - November 2009 Franck Cassez, Stavros TripakisIn this book Chapter, we review the main results pertaining to the problem of fault diagnosis of timed automata. Timed automata are introduced in Chapter 1 and Chapter 2 in this book, and the reader...Communicating Embedded Systems Software and Design - November 2009 Lixiang Xiong, Lavy Libman, Guoqiang MaoWe consider cooperative retransmission strategies in wireless networks, where the retransmission of a failed frame is handled not by the original source but rather by common neighbors overhearing the transmission. The majority of existing literature in ...IEEE LCN - October 2009 Lixiang Xiong, Lavy Libman, Guoqiang MaoCooperative communication methods in wireless networks, ranging from relaying by a common neighbor over a single wireless hop to opportunistic routing at the network layer, have been shown in recent years to offer significant performance gains over ...IEEE LCN - October 2009 Tahir Mehmood, Lavy LibmanIn wireless networks, transmissions can generally be overheard by unintended nodes in the vicinity of the sender and receiver, potentially causing interference to their own communications. Much of the related research has considered this as a nuisance and...IEEE LCN - October 2009 Olivier Mehani, Roksana Boreli, Thierry ErnstWe propose a framework to optimize the communication performance and mobility management in vehicular networks. By having a single unified decision algorithm taking into account both stack-related and external contextual information such as GPS ...ITST 9th International Conference on ITS Telecommunications - October 2009 Fawad Nazir, Aruna SeneviratneIn Mobile Social Networks (MSN) individuals with similar interests or commonalities, connect to each other using the mobile phones. Validation of protocols for MSN relies al- most exclusively on simulations. Thus a simulation using a mobility model ...OZCHI 2009 - November 2009 Ralf Huuck, Gerwin Klein, Schlich BastianThis volume contains the proceedings of the 4th International Workshop on Systems Software Verification (SSV) held in Aachen, Germany, June 22--24, 2009. The purpose of SSV is to bring together researchers and developers from both academia and ...Electronic Notes in Theoretical Computer Science - October 2009 Franck Cassez, Jérémy Dubreil, Hervé Marchand In this paper, we address the problem of synthesizing \emph{opaque} systems. A secret predicate$S$over the runs of a system$G$is \emph{opaque} to an external user having partial observability over$G, if s/he can never infer from the ...7th International Symposium on Automated Technology for Verification and Analysis (ATVA'09) - October 2009 Terence Chen, Olivier Mehani, Roksana BoreliTo build trust between two entities in VANET is particularly difficult due to lack of infra-structure, openness of wireless links and the usually highly dynamic network topology. To address these problems, we propose an effective trusted routing mechanism...ITST 9th International Conference on ITS Telecommunications - October 2009 D. Musicki, Rob EvansIEEE TAES - October 2009 J. Yang, Nhan Tran, Leo Bai, David Ng, M Halpern, Stan Skafidas, Iven MareelsASIC, 2009. ASICON '09. IEEE 8th International Conference - October 2009 Yuan Mo, Ke (Desmond) Wang, Fan (Frank) Zhang, Stan Skafidas, Rob Evans, Iven MareelsASIC, 2009. ASICON '09. IEEE 8th International Conference - October 2009 Y. GuChinese Study of Research Graduate Conference - October 2009 William Shieh, Bojan Djordjevic - October 2009 Thomas Chae, Trevor AndersonIEEE LEOS - October 2009 G. Abraham, Adam Kowalczyk, Izhak Haviv, Justin ZobelBioinformatics Australia 2009 - October 2009 T. Close, JD Tournier, F Calamante, LA Johnston, Iven Mareels, A. ConnellyNeuroImage - October 2009 Bahman Tahayori, LA Johnston, Peter Farrell, Iven MareelsJournal of Biomedical Signal Processing and Control - October 2009 M. Bakaul, Rajib Chakravorty, Thas Nirmalathas22nd Annual Meeting of IEEE Protonics Society - October 2009 Eric Cheng, Subhash Challa, Rajib Chakravorty2nd International Conference on BioMedical Engineering and Informatics (BMEI’09) - October 2009 L. JohnstonPrince of Wales Medical Research Institute - October 2009 Max OttInternational Conference on Future Information Networks - October 2009 Gerwin Klein, Kevin Elphinstone, Gernot Heiser, June Andronick, David Cock, Philip Derrin, Dhammika Elkaduwe, Kai Engelhardt, Rafal Kolanski, Michael Norrish, Thomas Sewell, Tuch Harvey, Simon WinwoodComplete formal verification is the only known way to guarantee that a system is free of programming errors. We present our experience in performing the formal, machine-checked verification of the seL4 microkernel from an abstract specification down to ...Symposium on Operating Systems Principles - October 2009 Thierry Rakotoarivelo, Max Ott, Ivan Seskar, Guillaume JourjonNetworking testbeds are playing an increasingly important role in the development of new communication technologies. Testbeds are traditionally built for a particular project or to study a specific technology. An alternative approach is to federate ...SOSP Workshop on Real Overlays and Distributed Systems (ROADS '09) - October 2009 Razibul Islam, M. Bakaul, Thas Nirmalathas, GE TownMicrowave Photonics Conference 2009 - October 2009 Tyrel Russell, Toby WalshIn sports competitions, teams can manipulate the result by, for instance, throwing games. We show that we can decide how to manipulate round robin and cup competitions, two of the most popular types of sporting competitions in polynomial time. In ...First International Conference on Algorithmic Decision Theory (ADT 2009) - October 2009 Enrico Pilotto, Francesca Rossi, Brent Venable, Toby WalshThe stable marriage problem has many practical applications in two sided markets like those that assign doctors to hospitals, students to schools, or buyers to vendors. Most algorithms to find stable marriages assume that the participants explicitly ...First International Conference on Algorithmic Decision Theory (ADT 2009) - October 2009 Max Ott2nd Japan-EU Symposium on the New-Generation Network and Future Internet - October 2009 Leonid Ryzhyk, Peter Chubb, Ihor Kuz, Etienne Le Sueur, Gernot Heiser Faulty device drivers cause significant damage through downtime and data loss. The problem can be mitigated by an improved driver development process that guarantees correctness by construction. We achieve this by synthesizing...Symposium on Operating System Principles - October 2009 di yang, Hongdong LiThis paper presents a method for learning Radial Basis Functions (RBF) model with variable dimensions for aligning/ registrating images of deformable surface. Traditional RBF-based approach, which is mainly based on a fixed dimension parametric model,...ICCV Workshop on 2009 Non-Rigid Shape Analysis and Deformable Image Alignment - Octorber 2009 Tamir Yedidya, Peter Carr, Richard Hartley, Jean-Pierre GuillonWe address the problem of identifying dry areas in the tear film as part of a diagnostic tool for dry-eye syndrome. The requirement is to identify and measure the growth of the dry regions to provide a time-evolving map of degrees of dryness. We ...The Medical Image Computing and Computer Assisted Intervention (MICCAI) - September 2009 Max OttEiffel Think Tank Meeting - October 2009 Carlos Aydos, Bernhard Hengst, William UtherFaced with increasing congestion on urban roads, authorities need better real-time traffic information to manage traffic. Kalman Filters are efficient algorithms that can be adapted to track vehicles in urban traffic given noisy sensor data. A Kalman ...12th International IEEE Conference on Intelligent Transportation Systems - October 2009 Daniel Dallas, Leif HanlenThe energy consumed by radio transceivers is a significant factor limiting the lifetime of wireless sensor networks (WSNs). Maximizing WSN lifetime is the overall aim of this work, which proposes that optimal routing be defined with a network design...ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems - October 2009 Oliver Nagy, Leif HanlenThis paper shows how to use an ideal rubber string, which is clamped down at both ends, as a memory device. The information is stored on the string by giving it an initial shape, where the Fourier coefficients of this shape represent the code bits. Once ...Information Theory Workshop - October 2009 Kostia RobertDue to the recent progress in computer vision to interpret images and sequence of images, the video camera is a promising sensor for traffic monitoring and traffic surveillance at low cost. This paper focuses on the detection and tracking of multiple ...ITSC - October 2009 Hongdong LiA new method for optimal robust estimation. ICCV - 9 2009 Paola M.V. Rancoita, Marcus HutterThe algorithm mBPCR is a tool for estimating the profile of the log2ratio of copy number data. The procedure is a Bayesian piecewise constant regression and can be applied, generally, to estimate any piecewise constant function (like the log2ratio of the ...BioConductor -- Open Source Software for Biolnformatics - October 2009 Michael NorrishWe give an continuation-based implementation of rewriting for systems in the LCF tradition. These systems must construct explicit proofs of equations when rewriting, and currently do so in a way that can be very space-inefﬁcient. An explicit ...Journal of Automated Reasoning (JAR) - October 2009 renato iannella, John Breslin, Adrienne Felt, Michael MaximilienThe objective of the 1st International Workshop on Social Interoperable Networks - is to bring together the Social Networks community and to discuss the technical interoperability issues facing service providers and end users. The workshop will attract ...4th Asian Semantic Web Conference - December 2009 Matt (Bang) Zhang, Getian Ye, Yang Wang, Jie Xu, Gunawan HermanA multiclass classification problem can be reduced to a collection of binary problems using an error-correcting coding matrix that specifies the binary partitions of the classes. The final classifier is an ensemble of base classifiers learned on the ...IEEE International Conference on Computer Vision - September 2009 Glenn Geers, Paul Tyler, Bernhard Hengst, Enyang Huang, Douglas QuailRoundabouts are widely used traffic control measures that function particularly well under balanced, light-to-medium approach traffic flows. However, even moderate flow imbalance can cause disruption and lengthy delays. One solution is to meter traffic on...2009 ITS World Congress - September 2009 Anthony Collins, Anastasia Bezerianos, Gregor Mcewan, Markus Rittenbruch, Rainer Wasinger, Judy KayThe ubiquitous computing vision includes Single Display Groupware (SDG) devices embedded in our normal envi- ronment. This paper explores the nature of interfaces for supporting people in accessing their ﬁles on such displays. To do this, we designed ...Ubicomp - September 2009 Peter Carr, Richard HartleyWe describe an energy minimization algorithm for functions defined on 4-connected lattices, of the type usually encountered in problems involving images. Such functions are often minimized using graph-cuts/max-flow, but this method is only applicable...ICCV - September 2009 Cong Phuoc Huynh, Antonio Robles-KellyIn this paper, we identify the constraints under which the generally ill-posed problem of simultaneous recovery of surface shape and its photometric invariants can be rendered tractable. We examine the cases where a single or more images are acquired ...IEEE International Conference on Computer Vision - September 2009 Roksana Boreli, Thava Iyer, Christoph Dwertmann, Golam Sarwar, Klok FritsWe describe the research outcomes and resulting implementation and validation of a prototype IP telephony and data acceleration system for satellite communications. The system has been designed as a quickly deployable solution for generic use with fixed ...IWSSC - September 2009 Worapan Kusakunniran, Jian Zhang, Qiang Wu, Hongdong LiGait is one of well recognized biometrics that has been widely used for human identiﬁcation. However, viewing direction change causes many difﬁculties to the current gait recognition because the viewing angle under which the gait signature database was ...Second IEEE International Workshop on Tracking Humans for the Evaluation of their Motion in Image Sequences (THEMIS2009): a workshop in ICCV2009 - October 2009 Meena Jha, Liam O'BrienOne of the reasons for introducing software product lines (SPL) is the reduction of costs through reusing common assets for different products. Developing assets to be reused in different products is often not easy. Increasing complexity due to the ...International Conference on Software Reuse - September 2009 Anirban Mahanti, Himanshu Gupta, Vinay RibeiroThe immense popularity of new-age Web 2'' applications such as YouTube, Flickr, and Facebook, and non-Web applications such as Peer-to-Peer (P2P) file sharing, Voice over IP, online games, and media streaming have significantly altered the ...IEEE/ACM MASCOTS - September 2009 Yuchao Dai, Jochen Trumpf, Hongdong Li, Nick Barnes, Richard HartleyWe present a method for calibrating the rotation between two cameras in a camera rig in the case of non-overlapping fields of view and in a globally consistent manner. First, rotation averaging strategies are discussed and anL_1\$-optimal rotation ...Asian Conference on Computer Vision - September 2009 Iman Shames, Brian Anderson, Baris FidanIn this paper we report some new results obtained in the field of multi-agent systems that are based on convex optimization. First, we provide review of a set of polynomial function optimization tools including sum of squares (SOS) and semidefinite ...IFAC Workshop on Estimation and Control of Networked Systems - September 2009 4th European Microwave Integrated Circuits Conference (EuMIC 2009) - September 2009 Quang Nguyen, Antonio Robles-Kelly, Jun ZhouIn this paper, we present a feature combination approach to object tracking based upon graph embedding techniques. The method presented here abstracts the low complexity features used for purposes of tracking to a relational structure and employs ...ACCV 2009 - September 2009 Renato IannellaThe move towards the Policy-Oriented Web is destined to provide support for policy expression and management in the core web layers. One of the most promising areas that can drive this new technology adoption is e-Society communities. With so much ...9th IFIP Conference on e-Business, e-Services, and e-Society - Sept 2009 Silvia Richter, Malte HelmertHeuristic forward search is the dominant approach to satisficing planning to date. Most successful planning systems, however, go beyond plain heuristic search by employing various search-enhancement techniques. One example is the use of helpful ...19th International Conference on Automated Planning and Scheduling (ICAPS-09) - September 2009 Junae Kim, Chunhua Shen, Lei WangA distance metric that can accurately reflect the intrinsic characteristics of data is critical for visual recognition tasks. An effective solution to defining such a metric is to learn it from a set of training samples. In this work, we propose a fast...Aisian Conference on Computer Vision - September 2009 Bertil Schmidt, R. Sinha, B. Beresford-Smith, SJ PuglisiBioinformatics - September 2009 Trevor Anderson, D. Beaman, Jonathan Li, O. Jerphagnon , E. Le Rouzic , F. Neddam, S. Salaün35th European Conference on Optical Communication (ECOC 2009) - September 2009