Sciweavers

1056 search results - page 88 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
ECCV
2004
Springer
15 years 11 hour ago
Structure and Motion from Images of Smooth Textureless Objects
This paper addresses the problem of estimating the 3D shape of a smooth textureless solid from multiple images acquired under orthographic projection from unknown and unconstrained...
Yasutaka Furukawa, Amit Sethi, Jean Ponce, David J...
ICDE
2005
IEEE
111views Database» more  ICDE 2005»
14 years 11 months ago
Schema Matching using Duplicates
Most data integration applications require a matching between the schemas of the respective data sets. We show how the existence of duplicates within these data sets can be exploi...
Alexander Bilke, Felix Naumann
KDD
2009
ACM
178views Data Mining» more  KDD 2009»
14 years 10 months ago
Catching the drift: learning broad matches from clickthrough data
Identifying similar keywords, known as broad matches, is an important task in online advertising that has become a standard feature on all major keyword advertising platforms. Eff...
Sonal Gupta, Mikhail Bilenko, Matthew Richardson
PERCOM
2005
ACM
14 years 9 months ago
When Does Opportunistic Routing Make Sense?
Different opportunistic routing protocols have been proposed recently for routing in sensor networks. These protocols exploit the redundancy among nodes by using a node that is av...
Adam Wolisz, Jan M. Rabaey, Rahul C. Shah, Sven Wi...
PEPM
2009
ACM
14 years 7 months ago
Program analysis for bug detection using parfait: invited talk
The goal of the Parfait project is to find bugs in C source code in a scalable and precise way. To this end, Parfait was designed as a framework with layers of sound program anal...
Cristina Cifuentes, Nathan Keynes, Lian Li, Bernha...