Sciweavers

1015 search results - page 161 / 203
» The data locality of work stealing
Sort
View
ACCV
2010
Springer
13 years 3 months ago
Affordance Mining: Forming Perception through Action
This work employs data mining algorithms to discover visual entities that are strongly associated to autonomously discovered modes of action, in an embodied agent. Mappings are lea...
Liam Ellis, Michael Felsberg, Richard Bowden
PERCOM
2011
ACM
13 years 11 days ago
Privacy preservation schemes for querying wireless sensor networks
—In this work we study the problem of query privacy in large scale sensor networks. Motivated by a novel trust model in which clients query networks owned by trusted entities but...
Tassos Dimitriou, Ahmad Sabouri
CSCW
2012
ACM
12 years 4 months ago
Between us and them: building connectedness within civic networks
Civic networks of community-based organizations face significant challenges in working together to combat issues facing their community (e.g., gang violence, sex trafficking). In ...
Jennifer Stoll, W. Keith Edwards, Kirsten A. Foot
IJCV
2012
11 years 11 months ago
Globally Optimal Estimation of Nonrigid Image Distortion
Abstract Image alignment in the presence of non-rigid distortions is a challenging task. Typically, this involves estimating the parameters of a dense deformation field that warps...
Yuandong Tian, Srinivasa G. Narasimhan
ESWS
2007
Springer
14 years 2 months ago
A Performance and Scalability Metric for Virtual RDF Graphs
Abstract. From a theoretical point of view, the Semantic Web is understood in terms of a stack with RDF being one of its layers. A Semantic Web application operates on the common d...
Michael Hausenblas, Wolfgang Slany, Danny Ayers