Bandit Framework for Systematic Learning in Wireless Video-Based Face Recognition
暂无分享,去创建一个
[1] David G. Lowe,et al. Object recognition from local scale-invariant features , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.
[2] Alejandro F. Frangi,et al. Two-dimensional PCA: a new approach to appearance-based face representation and recognition , 2004 .
[3] Aleksandrs Slivkins,et al. Contextual Bandits with Similarity Information , 2009, COLT.
[4] Sergio Barbarossa,et al. Computation offloading for mobile cloud computing based on wide cross-layer optimization , 2013, 2013 Future Network & Mobile Summit.
[5] Allen Y. Yang,et al. Robust Face Recognition via Sparse Representation , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[6] Yuan Zhao,et al. When mobile terminals meet the cloud: computation offloading as the bridge , 2013, IEEE Network.
[7] Bernd Girod,et al. Mobile Visual Search , 2011, IEEE Signal Processing Magazine.
[8] Lin Sun,et al. Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera , 2007, 2007 IEEE 11th International Conference on Computer Vision.
[9] Harin Sellahewa,et al. Wavelet-based face verification for constrained platforms , 2005, SPIE Defense + Commercial Sensing.
[10] Qing Zhao,et al. Learning in a Changing World: Restless Multiarmed Bandit With Unknown Dynamics , 2010, IEEE Transactions on Information Theory.
[11] Ahmet Sertbas,et al. Evaluation of face recognition techniques using PCA, wavelets and SVM , 2010, Expert Syst. Appl..
[12] T. L. Lai Andherbertrobbins. Asymptotically Efficient Adaptive Allocation Rules , 2022 .
[13] David J. Kriegman,et al. Acquiring linear subspaces for face recognition under variable lighting , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[14] M. van der Schaar,et al. Cross-layer wireless multimedia transmission: challenges, principles, and new paradigms , 2005, IEEE Wireless Communications.
[15] Ian H. Witten,et al. Detecting Replay Attacks in Audiovisual Identity Verification , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[16] Hong Li,et al. A liveness detection method for face recognition based on optical flow field , 2009, 2009 International Conference on Image Analysis and Signal Processing.
[17] Ted Taekyoung Kwon,et al. AMUSE: Empowering users for cost-aware offloading with throughput-delay tradeoffs , 2013, 2013 Proceedings IEEE INFOCOM.
[18] Ronald L. Graham,et al. Concrete mathematics - a foundation for computer science (2. ed.) , 1994 .
[19] Hui Li,et al. Toward a unified elastic computing platform for smartphones with cloud support , 2013, IEEE Network.
[20] Wendi B. Heinzelman,et al. Cloud-Vision: Real-time face recognition using a mobile-cloudlet-cloud acceleration architecture , 2012, 2012 IEEE Symposium on Computers and Communications (ISCC).
[21] Peter Auer,et al. Finite-time Analysis of the Multiarmed Bandit Problem , 2002, Machine Learning.
[22] Mihaela van der Schaar,et al. Low-complexity reinforcement learning for delay-sensitive compression in networked video stream mining , 2013, 2013 IEEE International Conference on Multimedia and Expo (ICME).
[23] A. Girotra,et al. Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .
[24] Qing Zhao,et al. Distributed Learning in Multi-Armed Bandit With Multiple Players , 2009, IEEE Transactions on Signal Processing.
[25] Enrique G. Ortiz,et al. Evaluation of face recognition techniques for application to facebook , 2008, 2008 8th IEEE International Conference on Automatic Face & Gesture Recognition.
[26] Chong Luo,et al. Resource allocation for cloud-based free viewpoint video rendering for mobile phones , 2011, ACM Multimedia.
[27] Jang-Hee Yoo,et al. Liveness Detection for Embedded Face Recognition System , 2008 .
[28] Mihaela van der Schaar,et al. Decomposition Principles and Online Learning in Cross-Layer Optimization for Delay-Sensitive Applications , 2008, IEEE Transactions on Signal Processing.
[29] Mohsen Guizani,et al. Cloud-assisted mobile computing and pervasive services [Guest Editorial] , 2013, IEEE Netw..
[30] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[31] Sébastien Marcel,et al. MOBIO: MOBILE BIOMETRIC FACE AND SPEAKER AUTHENTICATION , 2010 .
[32] John Langford,et al. The Epoch-Greedy Algorithm for Multi-armed Bandits with Side Information , 2007, NIPS.
[33] J. Langford,et al. The Epoch-Greedy algorithm for contextual multi-armed bandits , 2007, NIPS 2007.
[34] Chong Luo,et al. Multimedia Cloud Computing , 2011, IEEE Signal Processing Magazine.
[35] Shaolei Ren,et al. Efficient Resource Provisioning and Rate Selection for Stream Mining in a Community Cloud , 2013, IEEE Transactions on Multimedia.
[36] David J. Kriegman,et al. From Few to Many: Illumination Cone Models for Face Recognition under Variable Lighting and Pose , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[37] Chi-Ho Chan,et al. An Evaluation of Video-to-Video Face Verification , 2010, IEEE Transactions on Information Forensics and Security.
[38] Wei Chu,et al. A contextual-bandit approach to personalized news article recommendation , 2010, WWW '10.
[39] Zhaohui Wu,et al. Liveness Detection for Face Recognition , 2008 .
[40] Xiaowei Yang,et al. CloudCmp: comparing public cloud providers , 2010, IMC '10.
[41] Mihaela van der Schaar,et al. Structural Solutions for Dynamic Scheduling in Wireless Multimedia Transmission , 2012, IEEE Transactions on Circuits and Systems for Video Technology.
[42] Mingyan Liu,et al. Online learning in decentralized multi-user spectrum access with synchronized explorations , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.
[43] Mihaela van der Schaar,et al. Structure-Aware Stochastic Control for Transmission Scheduling , 2010, IEEE Transactions on Vehicular Technology.
[44] Dan Siewiorek,et al. Generation smartphone , 2012, IEEE Spectrum.
[45] Ao Tang,et al. Opportunistic Spectrum Access with Multiple Users: Learning under Competition , 2010, 2010 Proceedings IEEE INFOCOM.
[46] Paul A. Viola,et al. Fast Multi-view Face Detection , 2003 .
[47] Béatrice Pesquet-Popescu,et al. Low-Latency Video Streaming With Congestion Control in Mobile Ad-Hoc Networks , 2012, IEEE Transactions on Multimedia.