Sciweavers

5109 search results - page 945 / 1022
» On Learning Limiting Programs
Sort
View
SIGCOMM
2006
ACM
15 years 6 months ago
MIRO: multi-path interdomain routing
The Internet consists of thousands of independent domains with different, and sometimes competing, business interests. However, the current interdomain routing protocol (BGP) limi...
Wen Xu, Jennifer Rexford
118
Voted
CVPR
2010
IEEE
15 years 6 months ago
ARISTA - Image Search to Annotation on Billions of Web Photos
Though it has cost great research efforts for decades, object recognition is still a challenging problem. Traditional methods based on machine learning or computer vision are stil...
Xin-Jing Wang, Ming Liu, Lei Zhang, Yi Li, Wei-Yin...
ICRA
2005
IEEE
116views Robotics» more  ICRA 2005»
15 years 6 months ago
Using Hierarchical EM to Extract Planes from 3D Range Scans
— Recently, the acquisition of three-dimensional maps has become more and more popular. This is motivated by the fact that robots act in the three-dimensional world and several t...
Rudolph Triebel, Wolfram Burgard, Frank Dellaert
SAC
2005
ACM
15 years 6 months ago
Retrieving lightly annotated images using image similarities
Users’ search needs are often represented by words and images are retrieved according to such textual queries. Annotation words assigned to the stored images are most useful to ...
Masashi Inoue, Naonori Ueda
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
15 years 6 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay