Sciweavers

1405 search results - page 70 / 281
» We Are No Longer A Priesthood
Sort
View
JAIR
2011
214views more  JAIR 2011»
14 years 3 months ago
Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mo...
Dmytro Korzhyk, Zhengyu Yin, Christopher Kiekintve...
106
Voted
INFOCOM
2002
IEEE
15 years 5 months ago
Improving the Performance of Interactive TCP Applications using Service Differentiation
Abstract—Interactive TCP applications, such as Telnet and the Web, are particularly sensitive to network congestion. Indeed, congestion-induced queuing and packet loss can be a s...
Waël Noureddine, Fouad A. Tobagi
95
Voted
CVPR
2010
IEEE
15 years 8 months ago
Outlier Removal Using Duality
In this paper we consider the problem of outlier removal for large scale multiview reconstruction problems. An efficient and very popular method for this task is RANSAC. However, a...
Carl Olsson, Anders Eriksson, Richard Hartley
WADS
2007
Springer
131views Algorithms» more  WADS 2007»
15 years 6 months ago
On the Robustness of Graham's Algorithm for Online Scheduling
While standard parallel machine scheduling is concerned with good assignments of jobs to machines, we aim to understand how the quality of an assignment is affected if the jobs’...
Michael Gatto, Peter Widmayer
116
Voted
ICRA
2006
IEEE
143views Robotics» more  ICRA 2006»
15 years 6 months ago
Evaluation of a Large Scale Pervasive Embedded Network for Robot Path Planning
— We investigate a technique that uses an embedded network deployed pervasively throughout an environment to aid robots in navigation. First, we show that the path computed by th...
Keith J. O'Hara, Victor Bigio, Shaun Whitt, Daniel...