Sciweavers

1465 search results - page 215 / 293
» Making the Correct Mistakes
Sort
View
MOBIHOC
2002
ACM
15 years 11 months ago
Weak duplicate address detection in mobile ad hoc networks
Auto-configuration is a desirable goal in implementing mobile ad hoc networks. Specifically, automated dynamic assignment (without manual intervention) of IP addresses is desirabl...
Nitin H. Vaidya
WSDM
2010
ACM
245views Data Mining» more  WSDM 2010»
15 years 9 months ago
Improving Quality of Training Data for Learning to Rank Using Click-Through Data
In information retrieval, relevance of documents with respect to queries is usually judged by humans, and used in evaluation and/or learning of ranking functions. Previous work ha...
Jingfang Xu, Chuanliang Chen, Gu Xu, Hang Li, Elbi...
EUROSYS
2008
ACM
15 years 9 months ago
BorderPatrol: isolating events for black-box tracing
Causal request traces are valuable to developers of large concurrent and distributed applications, yet difficult to obtain. Traces show how a request is processed, and can be anal...
Eric Koskinen, John Jannotti
CVPR
2010
IEEE
15 years 8 months ago
iCoseg: Interactive Co-segmentation with Intelligent Scribble Guidance
We present an algorithm for Interactive Cosegmentation of a foreground object from a group of related images. While previous approaches focus on unsupervised co-segmentation, we us...
Dhruv Batra, Adarsh Kowdle, Devi Parikh, Jiebo Luo...
FPGA
2009
ACM
273views FPGA» more  FPGA 2009»
15 years 6 months ago
A parallel/vectorized double-precision exponential core to accelerate computational science applications
Many natural processes exhibit exponential decay and, consequently, computational scientists make extensive use of e−x in computer simulation experiments. While it is common to ...
Robin Pottathuparambil, Ron Sass