Sciweavers

544 search results - page 93 / 109
» What cannot be computed locally!
Sort
View
ICASSP
2011
IEEE
14 years 4 months ago
Compression using self-similarity-based temporal super-resolution for full-exposure-time video
In order to allow sufficient amount of light into the image sensor, videos captured in poor lighting conditions typically have low frame rate and frame exposure time equals to in...
Mihoko Shimano, Gene Cheung, Imari Sato
112
Voted
ATAL
2003
Springer
15 years 5 months ago
Role allocation and reallocation in multiagent teams: towards a practical analysis
Despite the success of the BDI approach to agent teamwork, initial role allocation (i.e. deciding which agents to allocate to key roles in the team) and role reallocation upon fai...
Ranjit Nair, Milind Tambe, Stacy Marsella
141
Voted
SPEECH
2002
112views more  SPEECH 2002»
15 years 3 days ago
Relating dialogue games to information state
This paper1 discusses the use of `conversational' or `dialogue games' as a basis for building dialogue systems. We give a tutorial overview of some recent attempts to re...
Stephen G. Pulman
113
Voted
NIPS
2000
15 years 1 months ago
One Microphone Source Separation
Source separation, or computational auditory scene analysis, attempts to extract individual acoustic objects from input which contains a mixture of sounds from different sources, ...
Sam T. Roweis
97
Voted
FOCS
2007
IEEE
15 years 6 months ago
Intrusion-Resilient Secret Sharing
We introduce a new primitive called Intrusion-Resilient Secret Sharing (IRSS), whose security proof exploits the fact that there exist functions which can be efficiently computed ...
Stefan Dziembowski, Krzysztof Pietrzak