Sciweavers

24529 search results - page 4583 / 4906
» Computing on Authenticated Data
Sort
View
JMLR
2012
13 years 7 months ago
Randomized Optimum Models for Structured Prediction
One approach to modeling structured discrete data is to describe the probability of states via an energy function and Gibbs distribution. A recurring difficulty in these models is...
Daniel Tarlow, Ryan Prescott Adams, Richard S. Zem...
156
Voted
ICDE
2012
IEEE
240views Database» more  ICDE 2012»
13 years 7 months ago
Ego-centric Graph Pattern Census
—There is increasing interest in analyzing networks of all types including social, biological, sensor, computer, and transportation networks. Broadly speaking, we may be interest...
Walaa Eldin Moustafa, Amol Deshpande, Lise Getoor
163
Voted
INFOCOM
2012
IEEE
13 years 7 months ago
Energy-optimal mobile application execution: Taming resource-poor mobile devices with cloud clones
Abstract—In this paper, we propose to leverage cloud computing to tame resource-poor mobile devices. Specifically, mobile applications can be executed in the mobile device (know...
Yonggang Wen, Weiwen Zhang, Haiyun Luo
TOG
2012
199views Communications» more  TOG 2012»
13 years 7 months ago
Tracking surfaces with evolving topology
We present a method for recovering a temporally coherent, deforming triangle mesh with arbitrarily changing topology from an incoherent sequence of static closed surfaces. We solv...
Morten Bojsen-Hansen, Hao Li, Chris Wojtan
167
Voted
TOG
2012
193views Communications» more  TOG 2012»
13 years 7 months ago
Continuous character control with low-dimensional embeddings
Interactive, task-guided character controllers must be agile and responsive to user input, while retaining the flexibility to be readily authored and modified by the designer. C...
Sergey Levine, Jack M. Wang, Alexis Haraux, Zoran ...
« Prev « First page 4583 / 4906 Last » Next »