Researchers at the National Institute of Standards and Technology are developing a virtual manufacturing cell. This cell will contain simulation models of a wide range of manufact...
We examine the design space of auction mechanisms and identify three core activities that structure this space. Formal parameters qualifying the performance core activities enable...
Peter R. Wurman, Michael P. Wellman, William E. Wa...
Image retrieval critically relies on the distance function used to compare a query image to images in the database. We suggest to learn such distance functions by training binary ...
A perfect hash function (PHF) is an injective function that maps keys from a set S to unique values, which are in turn used to index a hash table. Since no collisions occur, each k...
Fabiano C. Botelho, Hendrickson R. Langbehn, Guilh...
Many binary code encoding schemes based on hashing have been actively studied recently, since they can provide efficient similarity search, especially nearest neighbor search, an...