ABSTRACT In this paper, we report our experiments using a realworld image dataset to examine the effectiveness of Isomap, LLE and KPCA. The 1,897-image dataset we used consists of ...
Mei-Chen Yeh, I-Hsiang Lee, Gang Wu, Yi Wu, Edward...
Abstract— Protocols for distributed hash tables (DHTs) incorporate features to achieve low latency for lookup requests in the face of churn, continuous changes in membership. The...
Jinyang Li, Jeremy Stribling, Robert Morris, M. Fr...
Software debugging is the process of locating and correcting faulty code. Prior techniques to locate faulty code either use program analysis techniques such as backward dynamic pr...
Displays combining both 2D and 3D views have been shown to support higher performance on certain visualization tasks. However, it is not clear how best to arrange a combination of...
Melanie Tory, M. Stella Atkins, Arthur E. Kirkpatr...
One of the challenging tasks in the deployment of dense wireless networks (like sensor networks) is in devising a routing scheme for node to node communication. Important consider...