Sciweavers

ICRA
2010
IEEE
111views Robotics» more  ICRA 2010»
13 years 3 months ago
Multi-tasking SLAM
— The problem of simultaneous localization and mapping (SLAM) is one of the most studied in the robotics literature. Most existing approaches, however, focus on scenarios where l...
Arthur Guez, Joelle Pineau
CG
2006
Springer
13 years 4 months ago
Connectivity preserving digitization of blurred binary images in 2D and 3D
Connectivity and neighborhood are fundamental topological properties of objects in pictures. Since the input for any image analysis algorithm is a digital image, which does not ne...
Peer Stelldinger, Ullrich Köthe
SIGCOMM
2010
ACM
13 years 4 months ago
DONAR: decentralized server selection for cloud services
Geo-replicated services need an effective way to direct client requests to a particular location, based on performance, load, and cost. This paper presents DONAR, a distributed sy...
Patrick Wendell, Joe Wenjie Jiang, Michael J. Free...
NIPS
2000
13 years 5 months ago
Feature Correspondence: A Markov Chain Monte Carlo Approach
When trying to recover 3D structure from a set of images, the most di cult problem is establishing the correspondence between the measurements. Most existing approaches assume tha...
Frank Dellaert, Steven M. Seitz, Sebastian Thrun, ...
ATAL
2008
Springer
13 years 6 months ago
Tags and image scoring for robust cooperation
Establishing and maintaining cooperation is an enduring problem in multi-agent systems and, although several solutions exist, the increased use of online trading systems, peerto-p...
Nathan Griffiths
AIIDE
2008
13 years 6 months ago
Integrating Story-Centric and Character-Centric Processes for Authoring Interactive Drama
Computer aided interactive drama has been widely applied for entertainment and pedagogy. Most existing approaches for authoring interactive drama use either story-centric or chara...
Mei Si, Stacy C. Marsella, Mark O. Riedl
DAWAK
2006
Springer
13 years 8 months ago
Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures
Abstract. Individual privacy will be at risk if a published data set is not properly de-identified. k-anonymity is a major technique to de-identify a data set. A more general view ...
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu...
IWCIA
2004
Springer
13 years 10 months ago
Shape Preserving Sampling and Reconstruction of Grayscale Images
Abstract. The expressiveness of a lot of image analysis algorithms depends on the question whether shape information is preserved during digitization. Most existing approaches to a...
Peer Stelldinger
DGCI
2005
Springer
13 years 10 months ago
Shape Preserving Digitization of Binary Images After Blurring
Topology is a fundamental property of shapes in pictures. Since the input for any image analysis algorithm is a digital image, which does not need to have the same topological char...
Peer Stelldinger, Ullrich Köthe
CVPR
2010
IEEE
13 years 10 months ago
Learning 3D Action Models from a few 2D videos for View Invariant Action Recognition
Most existing approaches for learning action models work by extracting suitable low-level features and then training appropriate classifiers. Such approaches require large amount...
Pradeep Natarajan, Vivek Singh, Ram Nevatia