Sciweavers

486 search results - page 70 / 98
» policy 2005
Sort
View
63
Voted
ICIP
2005
IEEE
15 years 11 months ago
Fast distortion-buffer optimized streaming of multimedia
This paper presents a distortion optimized streaming algorithm for on-demand streaming of multimedia. Given the pre-encoded packets of a multimedia stream, we propose a fast algor...
Anshul Sehgal, Ashish Jagmohan, Olivier Verscheure...
ICML
2005
IEEE
15 years 10 months ago
High speed obstacle avoidance using monocular vision and reinforcement learning
We consider the task of driving a remote control car at high speeds through unstructured outdoor environments. We present an approach in which supervised learning is first used to...
Jeff Michels, Ashutosh Saxena, Andrew Y. Ng
WWW
2005
ACM
15 years 10 months ago
Named graphs, provenance and trust
The Semantic Web consists of many RDF graphs nameable by URIs. This paper extends the syntax and semantics of RDF to cover such Named Graphs. This enables RDF statements that desc...
Jeremy J. Carroll, Christian Bizer, Patrick J. Hay...
52
Voted
KDD
2005
ACM
86views Data Mining» more  KDD 2005»
15 years 10 months ago
Probabilistic workflow mining
In several organizations, it has become increasingly popular to document and log the steps that makeup a typical business process. In some situations, a normative workflow model o...
Ricardo Silva, Jiji Zhang, James G. Shanahan
CHI
2005
ACM
15 years 10 months ago
Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing
We argue that an analytic proportionality assessment balancing usefulness and burden on individual or group privacy must be conducted throughout the design process to create accep...
Giovanni Iachello, Gregory D. Abowd