Sciweavers

1798 search results - page 286 / 360
» Generating presentation constraints from rhetorical structur...
Sort
View
93
Voted
SCM
2003
15 years 2 months ago
Dissecting Configuration Management Policies
A configuration management policy specifies the procedures through which a user evolves artifacts stored in a configuration management system. Different configuration management sy...
Ronald van der Lingen, André van der Hoek
109
Voted
NIPS
2000
15 years 2 months ago
Feature Correspondence: A Markov Chain Monte Carlo Approach
When trying to recover 3D structure from a set of images, the most di cult problem is establishing the correspondence between the measurements. Most existing approaches assume tha...
Frank Dellaert, Steven M. Seitz, Sebastian Thrun, ...
99
Voted
ISLPED
2010
ACM
206views Hardware» more  ISLPED 2010»
15 years 26 days ago
Energy efficient implementation of parallel CMOS multipliers with improved compressors
Booth encoding is believed to yield faster multiplier designs with higher energy consumption. 16x16-bit Booth and NonBooth multipliers are analyzed in energy and delay space under...
Dursun Baran, Mustafa Aktan, Vojin G. Oklobdzija
105
Voted
IM
2007
15 years 17 days ago
Inverted Index Support for Numeric Search
Today’s search engines are increasingly required to broaden their capabilities beyond free-text search. More complex features, such as supporting range constraints over numeric ...
Marcus Fontoura, Ronny Lempel, Runping Qi, Jason Y...
107
Voted
AAMAS
2004
Springer
15 years 16 days ago
Multi-Dimensional, MultiStep Negotiation
We present a multi-dimensional, multi-step negotiation mechanism for task allocation among cooperative agents based on distributed search. This mechanism uses marginal utility gai...
Xiaoqin Zhang, Victor R. Lesser, Rodion M. Podoroz...