Sciweavers

1822 search results - page 320 / 365
» Risk-Sensitive Online Learning
Sort
View
WWW
2006
ACM
14 years 8 months ago
Invisible participants: how cultural capital relates to lurking behavior
The asymmetry of activity in virtual communities is of great interest. While participation in the activities of virtual communities is crucial for a community's survival and ...
Vladimir Soroka, Sheizaf Rafaeli
SIGMOD
2009
ACM
168views Database» more  SIGMOD 2009»
14 years 8 months ago
Database research in computer games
This tutorial presents an overview of the data management issues faced by computer games today. While many games do not use databases directly, they still have to process large am...
Alan J. Demers, Johannes Gehrke, Christoph Koch, B...
CVPR
2009
IEEE
14 years 5 months ago
Visual loop closing using multi-resolution SIFT grids in metric-topological SLAM
We present an image-based Simultaneous Localization and Mapping (SLAM) framework with online, appearanceonly loop closing. We adopt a layered approach with metric maps over small ...
Vivek Pradeep, Gérard G. Medioni, James Wei...
ASIACRYPT
2009
Springer
14 years 2 months ago
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
Abstract. We describe a public-key encryption scheme based on lattices — specifically, based on the hardness of the learning with error (LWE) problem — that is secure against ...
Jonathan Katz, Vinod Vaikuntanathan
CIVR
2009
Springer
192views Image Analysis» more  CIVR 2009»
14 years 2 months ago
Example based video filters
Many of the successful multimedia retrieval systems focus on developing efficient and effective video retrieval solutions with the help of appropriate index structures. In these ...
Mihir Jain, Sreekanth Vempati, Chandrika Pulla, C....