Sciweavers

163 search results - page 21 / 33
» K-Nearest Neighbor Search using the Pyramid Technique
Sort
View
STOC
2002
ACM
177views Algorithms» more  STOC 2002»
15 years 9 months ago
Similarity estimation techniques from rounding algorithms
A locality sensitive hashing scheme is a distribution on a family F of hash functions operating on a collection of objects, such that for two objects x, y, PrhF [h(x) = h(y)] = si...
Moses Charikar
SARA
2009
Springer
15 years 4 months ago
Efficient SAT Techniques for Absolute Encoding of Permutation Problems: Application to Hamiltonian Cycles
We study novel approaches for solving of hard combinatorial problems by translation to Boolean Satisfiability (SAT). Our focus is on combinatorial problems that can be represented...
Miroslav N. Velev, Ping Gao 0002
IJCAI
2007
14 years 11 months ago
Using Learned Policies in Heuristic-Search Planning
Many current state-of-the-art planners rely on forward heuristic search. The success of such search typically depends on heuristic distance-to-the-goal estimates derived from the ...
Sung Wook Yoon, Alan Fern, Robert Givan
MVA
1998
162views Computer Vision» more  MVA 1998»
14 years 9 months ago
Multipass hierarchical stereo matching for generation of digital terrain models from aerial images
Abstract. This paper presents a new multi-pass hierarchical stereo-matching approach for generation of digital terrain models (DTMs) from two overlapping aerial images. Our method ...
Yi-Ping Hung, Chu-Song Chen, Kuan-Chung Hung, Yong...
57
Voted
KES
2005
Springer
15 years 3 months ago
Detecting Search Engine Spam from a Trackback Network in Blogspace
Abstract. We aim to develop a technique to detect search engine optimization (SEO) spam websites. Specifically, we propose four methods for extracting the SEO spam entries from a ...
Masahiro Kimura, Kazumi Saito, Kazuhiro Kazama, Sh...