Sciweavers

553 search results - page 63 / 111
» Bundle Adjustment in the Large
Sort
View
STOC
2006
ACM
130views Algorithms» more  STOC 2006»
14 years 9 months ago
Explicit capacity-achieving list-decodable codes
For every 0 < R < 1 and > 0, we present an explicit construction of error-correcting codes of rate R that can be list decoded in polynomial time up to a fraction (1 - R ...
Venkatesan Guruswami, Atri Rudra
WSDM
2009
ACM
136views Data Mining» more  WSDM 2009»
14 years 3 months ago
Mining common topics from multiple asynchronous text streams
Text streams are becoming more and more ubiquitous, in the forms of news feeds, weblog archives and so on, which result in a large volume of data. An effective way to explore the...
Xiang Wang 0002, Kai Zhang, Xiaoming Jin, Dou Shen
DEXA
2009
Springer
127views Database» more  DEXA 2009»
14 years 3 months ago
The Real Performance Drivers behind XML Lock Protocols
Abstract. Fine-grained lock protocols should allow for highly concurrent transaction processing on XML document trees, which is addressed by the taDOM lock protocol family enabling...
Sebastian Bächle, Theo Härder
INFOCOM
2008
IEEE
14 years 3 months ago
On the Design of Load Factor based Congestion Control Protocols for Next-Generation Networks
— Load factor based congestion control schemes have shown to enhance network performance, in terms of utilization, packet loss and delay. In these schemes, using more accurate re...
Ihsan A. Qazi, Taieb Znati
VLDB
2001
ACM
129views Database» more  VLDB 2001»
14 years 1 months ago
Similarity Search for Adaptive Ellipsoid Queries Using Spatial Transformation
Similarity retrieval mechanisms should utilize generalized quadratic form distance functions as well as the Euclidean distance function since ellipsoid queries parameters may vary...
Yasushi Sakurai, Masatoshi Yoshikawa, Ryoji Kataok...