Sciweavers

2774 search results - page 56 / 555
» Exploiting Deep Structure
Sort
View
TMC
2011
137views more  TMC 2011»
14 years 6 months ago
Cognitive Medium Access: Exploration, Exploitation, and Competition
— This paper establishes the equivalence between cognitive medium access and the competitive multi-armed bandit problem. First, the scenario in which a single cognitive user wish...
Lifeng Lai, Hesham El Gamal, Hai Jiang, H. Vincent...
ECCV
2002
Springer
16 years 1 months ago
Helmholtz Stereopsis: Exploiting Reciprocity for Surface Reconstruction
We present a method ? termed Helmholtz stereopsis ? for reconstructing the geometry of objects from a collection of images. Unlike existing methods for surface reconstruction (e.g...
Todd Zickler, Peter N. Belhumeur, David J. Kriegma...
ICDM
2008
IEEE
143views Data Mining» more  ICDM 2008»
15 years 6 months ago
Exploiting Data Semantics to Discover, Extract, and Model Web Sources
We describe DEIMOS, a system that automatically discovers and models new sources of information. The system exploits four core technologies developed by our group that makes an en...
José Luis Ambite, Craig A. Knoblock, Kristi...
CORR
2008
Springer
98views Education» more  CORR 2008»
14 years 12 months ago
Information Acquisition and Exploitation in Multichannel Wireless Networks
A wireless system with multiple channels is considered, where each channel has several transmission states. A user learns about the instantaneous state of an available channel by ...
Sudipto Guha, Kamesh Munagala, Saswati Sarkar
IEEECIT
2010
IEEE
14 years 10 months ago
Exploiting More Parallelism from Applications Having Generalized Reductions on GPU Architectures
Reduction is a common component of many applications, but can often be the limiting factor for parallelization. Previous reduction work has focused on detecting reduction idioms a...
Xiao-Long Wu, Nady Obeid, Wen-Mei Hwu