Sciweavers

14054 search results - page 2671 / 2811
» P
Sort
View
SODA
2008
ACM
110views Algorithms» more  SODA 2008»
15 years 6 months ago
Why simple hash functions work: exploiting the entropy in a data stream
Hashing is fundamental to many algorithms and data structures widely used in practice. For theoretical analysis of hashing, there have been two main approaches. First, one can ass...
Michael Mitzenmacher, Salil P. Vadhan
SODA
2008
ACM
185views Algorithms» more  SODA 2008»
15 years 6 months ago
Better bounds for online load balancing on unrelated machines
We study the problem of scheduling permanent jobs on unrelated machines when the objective is to minimize the Lp norm of the machine loads. The problem is known as load balancing ...
Ioannis Caragiannis
RIAO
2007
15 years 6 months ago
Multimodal Segmentation of Lifelog Data
A personal lifelog of visual and audio information can be very helpful as a human memory augmentation tool. The SenseCam, a passive wearable camera, used in conjunction with an iR...
Aiden R. Doherty, Alan F. Smeaton, Keansub Lee, Da...
RIAO
2007
15 years 6 months ago
Capturing Sentence Prior for Query-Based Multi-Document Summarization
In this paper, we have considered a real world information synthesis task, generation of a fixed length multi document summary which satisfies a specific information need. This...
Jagadeesh Jagarlamudi, Prasad Pingali, Vasudeva Va...
TRECVID
2008
15 years 6 months ago
The Lowlands Team at TRECVID 2008
Id: trecvid2008.tex 197 2008-10-23 13:28:48Z alyr Date: 2008-10-23 15:28:48 +0200 (Thu, 23 Oct 2008) Type Run Description MAP/mean infAP HLF Official H utcwiprimw146 Our prelimina...
Robin Aly, Djoerd Hiemstra, Arjen P. de Vries, Hen...
« Prev « First page 2671 / 2811 Last » Next »