Sciweavers

12052 search results - page 2116 / 2411
» computer 2010
Sort
View
COLT
2010
Springer
14 years 10 months ago
An Asymptotically Optimal Bandit Algorithm for Bounded Support Models
Multiarmed bandit problem is a typical example of a dilemma between exploration and exploitation in reinforcement learning. This problem is expressed as a model of a gambler playi...
Junya Honda, Akimichi Takemura
95
Voted
COMPIMAGE
2010
Springer
14 years 10 months ago
On the Effects of Normalization in Adaptive MRF Hierarchies
Abstract. In this paper, we analyze the effects of energy normalization in adaptivehierarchy-based energy minimization methods. Adaptive hierarchies provide a nt multi-level abstra...
Albert Y. C. Chen, Jason J. Corso
107
Voted
COMPSAC
2010
IEEE
14 years 10 months ago
Design and Implementation of a Middleware for Development and Provision of Stream-Based Services
This paper proposes MISSA, a novel middleware to facilitate the development and provision of stream-based services in emerging pervasive environments. The streambased services util...
Seungwoo Kang, Youngki Lee, Sunghwan Ihm, Souneil ...
DAGM
2010
Springer
14 years 10 months ago
3D Reconstruction Using an n-Layer Heightmap
We present a novel method for 3D reconstruction of urban scenes extending a recently introduced heightmap model. Our model has several advantages for 3D modeling of urban scenes: i...
David Gallup, Marc Pollefeys, Jan-Michael Frahm
DASFAA
2010
IEEE
220views Database» more  DASFAA 2010»
14 years 10 months ago
An Effective Object-Level XML Keyword Search
Keyword search is widely recognized as a convenient way to retrieve information from XML data. In order to precisely meet users' search concerns, we study how to effectively r...
Zhifeng Bao, Jiaheng Lu, Tok Wang Ling, Liang Xu, ...
« Prev « First page 2116 / 2411 Last » Next »