Sciweavers

1192 search results - page 29 / 239
» Computing Weakest Readings
Sort
View
CVPR
2010
IEEE
15 years 8 months ago
Reading Between The Lines: Object Localization Using Implicit Cues from Image Tags
Current uses of tagged images typically exploit only the most explicit information: the link between the nouns named and the objects present somewhere in the image. We propose to ...
Sung Ju Hwang, University of Texas, Kristen Grauma...
ICPADS
2002
IEEE
15 years 4 months ago
A Mobile Cache Consistency Protocol Using Shareable Read/Write Time Locks
Object caching is often used to improve the performance of mobile applications, but the gain is often lessened by the additional load of maintaining consistency between an origina...
Abhinav Vora, Zahir Tari, Peter Bertók, Kwo...
ACL
2011
14 years 3 months ago
Learning to Win by Reading Manuals in a Monte-Carlo Framework
This paper presents a novel approach for leveraging automatically extracted textual knowledge to improve the performance of control applications such as games. Our ultimate goal i...
S. R. K. Branavan, David Silver, Regina Barzilay
DEXAW
1998
IEEE
98views Database» more  DEXAW 1998»
15 years 3 months ago
Supporting Read-Only Transactions in Wireless Broadcasting
Wireless communications support a new form of data delivery in which servers broadcast data to a number of clients that listen to the broadcast channel and retrieve data of intere...
Evaggelia Pitoura
76
Voted
AAAI
1997
15 years 1 months ago
The Sounds of Silence: Towards Automated Evaluation of Student Learning in a Reading Tutor that Listens
1 We propose a paradigm for ecologically valid, authentic, unobtrusive, automatic, data-rich, fast, robust, and sensitive evaluation of computer-assisted student performance. We i...
Jack Mostow, Gregory Aist