Sciweavers

4761 search results - page 889 / 953
» Generalizing Boundary Points
Sort
View
SIGECOM
2010
ACM
156views ECommerce» more  SIGECOM 2010»
14 years 2 months ago
Robust mechanisms for risk-averse sellers
The existing literature on optimal auctions focuses on optimizing the expected revenue of the seller, and is appropriate for risk-neutral sellers. In this paper, we identify good ...
Mukund Sundararajan, Qiqi Yan
SIGMOD
2010
ACM
202views Database» more  SIGMOD 2010»
14 years 2 months ago
PAROS: pareto optimal route selection
Modern maps provide a variety of information about roads and their surrounding landscape allowing navigation systems to go beyond simple shortest path computation. In this demo, w...
Franz Graf, Hans-Peter Kriegel, Matthias Renz, Mat...
CIVR
2010
Springer
160views Image Analysis» more  CIVR 2010»
14 years 2 months ago
Today's and tomorrow's retrieval practice in the audiovisual archive
Content-based video retrieval is maturing to the point where it can be used in real-world retrieval practices. One such practice is the audiovisual archive, whose users increasing...
Bouke Huurnink, Cees G. M. Snoek, Maarten de Rijke...
ICIAR
2010
Springer
14 years 2 months ago
Adaptation of SIFT Features for Robust Face Recognition
Abstract. The Scale Invariant Feature Transform (SIFT) is an algorithm used to detect and describe scale-, translation- and rotation-invariant local features in images. The origina...
Janez Krizaj, Vitomir Struc, Nikola Pavesic
LCTRTS
2010
Springer
14 years 2 months ago
Cache vulnerability equations for protecting data in embedded processor caches from soft errors
Continuous technology scaling has brought us to a point, where transistors have become extremely susceptible to cosmic radiation strikes, or soft errors. Inside the processor, cac...
Aviral Shrivastava, Jongeun Lee, Reiley Jeyapaul