Search
Now showing items 71-80 of 111
How Much of a Hypertree can be Captured by Windmills?
(2005-01-03)
Current approximation algorithms for maximum weight {\em hypertrees} find heavy {\em windmill farms}, and are based on the fact that a constant ratio (for constant width $k$) of the weight of a $k$-hypertree can be captured ...
Gestural Cues for Sentence Segmentation
(2005-04-19)
In human-human dialogues, face-to-face meetings are often preferred over phone conversations.One explanation is that non-verbal modalities such as gesture provide additionalinformation, making communication more efficient ...
Efficient, Verifiable Binary Sandboxing for a CISC Architecture
(2005-05-02)
Executing untrusted code while preserving security requiresenforcement of memory and control-flow safety policies:untrusted code must be prevented from modifying memory orexecuting code except as explicitly allowed. ...
A Region-based Architecture for Service-Providing Distributed Systems
(2005-05-17)
A service-providing system consists of hosts that provide services such as data, content, computational and memory resources and data-based services to other entities in the system. Consumers that wish to use services ...
Simultaneous Localization, Calibration, and Tracking in an ad Hoc Sensor Network
(2005-04-26)
We introduce Simultaneous Localization and Tracking (SLAT), the problem of tracking a target in a sensor network while simultaneously localizing and calibrating the nodes of the network. Our proposed solution, LaSLAT, ...
Fast Rates for Regularized Least-squares Algorithm
(2005-04-14)
We develop a theoretical analysis of generalization performances of regularized least-squares on reproducing kernel Hilbert spaces for supervised learning. We show that the concept of effective dimension of an integral ...
Risk Bounds for Regularized Least-squares Algorithm with Operator-valued kernels
(2005-05-16)
We show that recent results in [3] on risk bounds for regularized least-squares on reproducing kernel Hilbert spaces can be straightforwardly extended to the vector-valued regression setting. We first briefly introduce ...
Learning From Snapshot Examples
(2005-04-13)
Examples are a powerful tool for teaching both humans and computers.In order to learn from examples, however, a student must first extractthe examples from its stream of perception. Snapshot learning is ageneral approach ...
Construction by robot swarms using extended stigmergy
(2005-04-08)
We describe a system in which simple, identical, autonomous robots assemble two-dimensional structures out of identical building blocks. We show that, in a system divided in this way into mobile units and structural units, ...
De-Emphasis of Distracting Image Regions Using Texture Power Maps
(2005-04-12)
A major obstacle in photography is the presence of distracting elements that pull attention away from the main subject and clutter the composition. In this article, we present a new image-processing technique that reduces ...