Sciweavers

76665 search results - page 15271 / 15333
» A proposed
Sort
View
AAAI
2011
13 years 12 months ago
On Expressing Value Externalities in Position Auctions
Externalities are recognized to exist in the sponsored search market, where two co-located ads compete for user attention. Existing work focuses on the effect of another ad on th...
Florin Constantin, Malvika Rao, Chien-Chung Huang,...
AEOG
2011
143views more  AEOG 2011»
13 years 11 months ago
Analyzing the effects of scale and land use pattern metrics on land use database generalization indices
The generalization index system is one of the critical issues for computer-aided land use database generalization. This paper studies the scale and land use pattern effects on lan...
Yaolin Liu, Limin Jiao, Yanfang Liu
APVIS
2011
13 years 11 months ago
Edge maps: Representing flow with bounded error
Robust analysis of vector fields has been established as an important tool for deriving insights from the complex systems these fields model. Many analysis techniques rely on co...
Harsh Bhatia, Shreeraj Jadhav, Peer-Timo Bremer, G...
ASAP
2011
IEEE
233views Hardware» more  ASAP 2011»
13 years 11 months ago
Accelerating vision and navigation applications on a customizable platform
—The domain of vision and navigation often includes applications for feature tracking as well as simultaneous localization and mapping (SLAM). As these problems require computati...
Jason Cong, Beayna Grigorian, Glenn Reinman, Marco...
ASIACRYPT
2011
Springer
13 years 11 months ago
The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy
A cryptographic assumption is the (unproven) mathematical statement that a certain computational problem (e.g. factoring integers) is computationally hard. The leakage-resilience l...
Divesh Aggarwal, Ueli Maurer
« Prev « First page 15271 / 15333 Last » Next »