Sciweavers

7921 search results - page 1583 / 1585
» LSH-preserving functions and their applications
Sort
View
SODA
2012
ACM
245views Algorithms» more  SODA 2012»
11 years 11 months ago
Lower bounds for number-in-hand multiparty communication complexity, made easy
In this paper we prove lower bounds on randomized multiparty communication complexity, both in the blackboard model (where each message is written on a blackboard for all players ...
Jeff M. Phillips, Elad Verbin, Qin Zhang
CVPR
2012
IEEE
11 years 11 months ago
Laser speckle photography for surface tampering detection
It is often desirable to detect whether a surface has been touched, even when the changes made to that surface are too subtle to see in a pair of before and after images. To addre...
Yi-Chang Shih, Abe Davis, Samuel W. Hasinoff, Fr&e...
TVCG
2012
178views Hardware» more  TVCG 2012»
11 years 11 months ago
Human Motion Retrieval from Hand-Drawn Sketch
—The rapid growth of motion capture data increases the importance of motion retrieval. The majority of the existing motion retrieval approaches are based on a labor-intensive ste...
Min-Wen Chao, Chao-Hung Lin, Jackie Assa, Tong-Yee...
AAAI
2012
11 years 11 months ago
Strategic Advice Provision in Repeated Human-Agent Interactions
This paper addresses the problem of automated advice provision in settings that involve repeated interactions between people and computer agents. This problem arises in many real ...
Amos Azaria, Zinovi Rabinovich, Sarit Kraus, Claud...
ICSE
2007
IEEE-ACM
14 years 2 months ago
ACL2s: "The ACL2 Sedan"
ACL2 is the latest inception of the Boyer-Moore theorem prover, the 2005 recipient of the ACM Software System Award. In the hands of an expert, it feels like a finely tuned race ...
Peter C. Dillinger, Panagiotis Manolios, Daron Vro...
« Prev « First page 1583 / 1585 Last » Next »