Sciweavers

1016 search results - page 18 / 204
» Explore or Exploit
Sort
View
ICASSP
2011
IEEE
13 years 21 days ago
Exploiting an interplay between norms to analyze scalar quantization schemes
Quantization is intrinsic to several data acquisition systems. This process is especially important in distributed settings, where observations must rst be compressed before they ...
Parimal Parag, Jean-François Chamberland
CVPR
2010
IEEE
14 years 5 months ago
Moving Vistas: Exploiting Motion for Describing Scenes
Scene recognition in an unconstrained setting is an open and challenging problem with wide applications. In this paper, we study the role of scene dynamics for improved representa...
Nitesh Shroff, Pavan Turaga, Rama Chellappa
ICPP
2008
IEEE
14 years 3 months ago
Implementing and Exploiting Inevitability in Software Transactional Memory
—Transactional Memory (TM) takes responsibility for concurrent, atomic execution of labeled regions of code, freeing the programmer from the need to manage locks. Typical impleme...
Michael F. Spear, Michael Silverman, Luke Dalessan...
UCS
2007
Springer
14 years 3 months ago
DroPicks - A Tool for Collaborative Content Sharing Exploiting Everyday Artefacts
Emergence of social web services like YouTube[1], Flickr[2] etc. is constantly transforming the way we share our lifestyles with family, friends and colleagues. The significance of...
Simo Hosio, Fahim Kawsar, Jukka Riekki, Tatsuo Nak...
CEFP
2005
Springer
14 years 2 months ago
Exploiting Purely Functional Programming to Obtain Bounded Resource Behaviour: The Hume Approach
This chapter describes Hume: a functionally-based language for programming with bounded resource usage, including time and space properties. The purpose of the Hume language design...
Kevin Hammond