Sciweavers

414 search results - page 33 / 83
» Commitment to Correlated Strategies
Sort
View
SIGIR
2005
ACM
14 years 1 months ago
On the collective classification of email "speech acts"
We consider classification of email messages as to whether or not they contain certain “email acts”, such as a request or a commitment. We show that exploiting the sequential ...
Vitor Rocha de Carvalho, William W. Cohen
CMS
2003
148views Communications» more  CMS 2003»
13 years 9 months ago
Computation of Cryptographic Keys from Face Biometrics
We outline cryptographic key–computation from biometric data based on error-tolerant transformation of continuous-valued face eigenprojections to zero-error bitstrings suitable f...
Alwyn Goh, David Ngo Chek Ling
IJCV
2007
138views more  IJCV 2007»
13 years 8 months ago
Correspondence-free Structure from Motion
We present a novel approach for the estimation of 3D-motion directly from two images using the Radon transform. The feasibility of any camera motion is computed by integrating over...
Ameesh Makadia, Christopher Geyer, Kostas Daniilid...
GLOBECOM
2006
IEEE
14 years 2 months ago
Blocking Model for All-Optical Overlaid-Star TDM Networks
—This paper studies the blocking performance of a class of all-optical overlaid-star TDM networks using a leastcongested-path routing strategy for path selection. An analytical m...
Jun Zheng, Cheng Peng, Gregor von Bochmann
JSSPP
2009
Springer
14 years 2 months ago
Scheduling Restartable Jobs with Short Test Runs
In this paper, we examine the concept of giving every job a trial run before committing it to run until completion. Trial runs allow immediate job failures to be detected shortly a...
Ojaswirajanya Thebe, David P. Bunde, Vitus J. Leun...