Sciweavers

980 search results - page 76 / 196
» On Negative Bases
Sort
View
ACL
2003
13 years 10 months ago
Towards a Model of Face-to-Face Grounding
We investigate the verbal and nonverbal means for grounding, and propose a design for embodied conversational agents that relies on both kinds of signals to establish common groun...
Yukiko I. Nakano, Gabe Reinstein, Tom Stocky, Just...
MM
2009
ACM
221views Multimedia» more  MM 2009»
14 years 3 months ago
Using large-scale web data to facilitate textual query based retrieval of consumer photos
The rapid popularization of digital cameras and mobile phone cameras has lead to an explosive growth of consumer photo collections. In this paper, we present a (quasi) real-time t...
Yiming Liu, Dong Xu, Ivor W. Tsang, Jiebo Luo
CP
2010
Springer
13 years 7 months ago
Domain Consistency with Forbidden Values
This paper presents a novel domain-consistency algorithm which does not maintain supports dynamically during propagation, but rather maintain forbidden values. It introduces the op...
Yves Deville, Pascal Van Hentenryck
RTS
2011
131views more  RTS 2011»
13 years 4 months ago
Global scheduling based reliability-aware power management for multiprocessor real-time systems
Reliability-aware power management (RAPM) has been a recent research focus due the negative effects of the popular power management technique dynamic voltage and frequency scaling ...
Xuan Qi, Dakai Zhu, Hakan Aydin
IJNSEC
2008
131views more  IJNSEC 2008»
13 years 9 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi