Sciweavers

7380 search results - page 1475 / 1476
» time 2008
Sort
View
CN
2010
91views more  CN 2010»
13 years 8 months ago
ILP formulations for non-simple p-cycle and p-trail design in WDM mesh networks
Conventional simple p-cycle (Preconfigured Protection Cycle) concept allows fast and capacity-efficient span protection in WDM mesh networks. Unlike simple p-cycle, non-simple p-cy...
Bin Wu, Kwan L. Yeung, Pin-Han Ho
CVPR
2008
IEEE
14 years 11 months ago
Clothing cosegmentation for recognizing people
Reseachers have verified that clothing provides information about the identity of the individual. To extract features from the clothing, the clothing region first must be localize...
Andrew C. Gallagher, Tsuhan Chen
SIAMDM
2010
113views more  SIAMDM 2010»
13 years 4 months ago
The VPN Problem with Concave Costs
We consider the following network design problem. We are given an undirected network with costs on the edges, a set of terminals, and an upper bound for each terminal limiting the ...
Samuel Fiorini, Gianpaolo Oriolo, Laura Sanit&agra...
SIGECOM
2011
ACM
203views ECommerce» more  SIGECOM 2011»
13 years 18 days ago
Polynomial-time computation of exact correlated equilibrium in compact games
In a landmark paper, Papadimitriou and Roughgarden [2008] described a polynomial-time algorithm (“Ellipsoid Against Hope”) for computing sample correlated equilibria of concis...
Albert Xin Jiang, Kevin Leyton-Brown
AAAI
2011
12 years 9 months ago
Recommendation Sets and Choice Queries: There Is No Exploration/Exploitation Tradeoff!
Utility elicitation is an important component of many applications, such as decision support systems and recommender systems. Such systems query users about their preferences and ...
Paolo Viappiani, Craig Boutilier
« Prev « First page 1475 / 1476 Last » Next »