In this paper, we propose two new, perceptually motivated strategies to better measure the similarity of 2D shape instances that are in the form of closed contours. The first strat...
Andrew Temlyakov, Brent C. Munsell, Jarrell W. Wag...
Social networking services well know that some users are unwilling to freely share the information they store with the service (e.g. profile information). To address this, servic...
— Service robots designed for domestic settings need to navigate in an environment that they have to share with their users. Thus, they have to be able to report their current st...
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
Most research in the field of anaphora or coreference detection has been limited to noun phrase coreference, usually on a restricted set of entities, such as ACE entities. In par...
Sameer S. Pradhan, Lance A. Ramshaw, Ralph M. Weis...