Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Carnegie-Document'
Carnegie-Document published presentations and documents on DocSlides.
Robotic Mapping A Survey Sebastian Thrun February CMUCS School of Computer Science Carnegie Mellon University Pittsburgh PA Abstract This article provides a comprehensive introduction into the eld
by olivia-moreira
It describes and compares various probabilistic t...
An Online Spectral Learning Algorithm for Partially Observable Nonlinear Dynamical Systems Byron Boots Machine Learning Department Carnegie Mellon University Pittsburgh Pennsylvania Geoffrey J
by cheryl-pisano
Gordon Machine Learning Department Carnegie Mello...
Unleashing M AYHEM on Binary Code Sang Kil Cha Thanassis Avgerinos Alexandre Rebert and David Brumley Carnegie Mellon University Pittsburgh PA sangkilc thanassis alexandre
by luanne-stotts
rebert dbrumley cmuedu Abstract In this paper we p...
RAIDR RetentionAware Intelligent DRAM Refresh Jamie Liu Ben Jaiyen Richard Veras Onur Mutlu Carnegie Mellon University jamielbjaiyenrverasonurcmu
by giovanna-bartolotta
edu Abstract Dynamic randomaccess memory DRAM is t...
Intro to Bilinear Maps Intro to Bilinear Maps John Bethencourt bethencocs
by alida-meadow
cmuedu Computer Sciences Department Carnegie Mello...
Integral Control of Humanoid Balance Benjamin Stephens The Robotics Institute Carnegie Mellon University Pittsburgh PA USA bstephenscmu
by tatyana-admore
edu httpwwwcscmuedu bstephe1 Abstract This paper ...
Dexterous TeleManipulation with A MultiTouch Interface Yue Peng Toh Shan Huang Joy Lin Maria Bajzek Garth Zeglin and Nancy S
by karlyn-bohler
Pollard Carnegie Mellon University Abstract Robus...
ATTITUDES AND SOCIAL COGNITION When Dreaming Is Believing The Motivated Interpretation of Dreams Carey K
by trish-goza
Morewedge Carnegie Mellon University Michael I No...
Optimizing Compilers Introduction T
by conchita-marotz
Mowry Carnegie Mellon Lecture 1 Introduction I Wh...
ExpectationPropagation for the Generative Aspect Model Thomas Minka Department of Statistics Carnegie Mellon University Pittsburgh PA USA minkastat
by test
cmuedu John Lafferty School of Computer Science Ca...
Autograph Toward Automated Distributed Worm Signature Detection HyangAh Kim hakimcs
by celsa-spraggs
cmuedu Carnegie Mellon University Brad Karp bradnk...
Finding almostperfect graph bisections enkatesan uruswami ury akarychev rasad aghavendra avid teurer uan hou Computer Science Department Carnegie Mellon University Pittsburgh PA
by mitsue-stanley
Some of this work was done during a visit to Micr...
Blase Eric Ur ONTACT NFORMATION Carnegie Mellon University blaseblaseur
by tatyana-admore
com 5000 Forbes Ave httpwwwblaseurcom Pittsburgh P...
Meanshift Blob Tracking through Scale Space Robert T
by lindy-dunigan
Collins Carnegie Mellon University Abstract The m...
Assignment Rules of a Single Indivisible Object under the Full Preference Domain Cigdem Gizem Korpeoglu Tepper School of Business Carnegie Mellon University Pittsburgh PA cpalaandrew
by lindy-dunigan
cmuedu November 12 2014 Abstract We consider the a...
Locating Internet Bottlenecks Algorithms Measurements and Implications Ningning Hu Li Erran Li Zhuoqing Morley Mao Carnegie Mellon University Bell Laboratories University o f Michigan hnncs
by giovanna-bartolotta
cmuedu erranllibelllabscom zmaoeecsumich edu Peter...
CatnapExploitingHighBandwidthWirelessInterfacesto SaveEnergyforMobileDevices Fahad R
by calandra-battersby
Dogar Carnegie Mellon University Pittsburgh PA US...
The Crossre Attack Min Suk Kang ECE Department and CyLab Carnegie Mellon University Email minsukkangcmu
by alexa-scheidler
edu Soo Bum Lee CyLab Carnegie Mellon University E...
TARTANS ABROAD FUND ROUP TRIP APPLICATION Short erm Organized International Travel TO IT This cohesive Carnegie Mellon fund supports undergraduate students in pursuing short term organized internati
by luanne-stotts
Monetary support is provided by the Dean of Stude...
Ecien Constructions for Onew Hash Chains YihCh un Hu Markus Jak obsson and Adrian errig UC Berk eley Indiana Univ ersit at Blo omington Carnegie Mellon Univ ersit Abstract
by sherrill-nordquist
Onew hains are an imp ortan cryptographic primiti...
Autograph Toward Automated Distributed Worm Signature Detection HyangAh Kim hakimcs
by min-jolicoeur
cmuedu Carnegie Mellon University Brad Karp bradnk...
Dealing With Betrayal in Close Relationships Does Commitment Promote Forgiveness Eli J
by natalia-silvester
Finkel Carnegie Mellon University Caryl E Rusbult...
Finding almostperfect graph bisections enkatesan uruswami ury akarychev rasad aghavendra avid teurer uan hou Computer Science Department Carnegie Mellon University Pittsburgh PA
by briana-ranney
Some of this work was done during a visit to Micr...
BlurBurst Removing Blur Due to Camera Shake using Multiple Images ATSUSHI ITO Sony Corporation and ASWIN C
by conchita-marotz
SANKARANARAYANAN Carnegie Mellon University and A...
CatnapExploitingHighBandwidthWirelessInterfacesto Save
by liane-varnes
Dogar Carnegie Mellon University Pittsburgh PA US...
Learning ClassSpecic Afnities for Image Labelling Dhru
by olivia-moreira
edu rahulscscmuedu tsuhancmuedu Carnegie Mellon Un...
Arithmetical Hierarchy Klaus Sutner Carnegie Mellon Un
by tatiana-dople
th function computable with dom th re set with Th...
Running head Privacy and the control paradox Misplace
by tatyana-admore
Email lbrandimandrewcmuedu Carnegie Mellon Univer...
Computability and Decidability Klaus Sutner Carnegie M
by olivia-moreira
More precisely we can explain what it means for a...
A Unied Annotation Scheme for the SemanticPragmatic Co
by stefany-barnette
cmuedu Department of Philosophy Carnegie Mellon Un...
Reconstructing corrupt DEFLATEd les RalfD
by test
Brown Carnegie Mellon University Language Technolo...
Unsupervised Discovery of MidLevel Discriminative Patc
by cheryl-pisano
Efros Carnegie Mellon University Pittsburgh PA 15...
Improved Guarantees for Agnostic Learning of Disjuncti
by test
cmuedu Avrim Blum Carnegie Mellon University avrim...
Watching a Cursor Distorts Haptically Guided Reproduct
by conchita-marotz
Klatzky Carnegie Mellon University Susan J Lederm...
Scalable Kernel Methods via Doubly Stochastic Gradient
by trish-goza
edu lsongccgatechedu Princeton University Carnegie...
Automatic PatchBased Exploit Generation is Possible Te
by phoebe-click
cmuedu dawnsongcsberkeleyedu jzhengcspitte du Carn...
In a 1966 picture named "Girls With Guns," the first generation of wom
by test
M O R E W O M E N Michael Bloomberg Andrew Carnegi...
Malware Hooking BehaviorsHeng Yin Zhenkai Liang Dawn Song Carnegie Mel
by liane-varnes
1 2 What is a hook? SSDT (System Service Descripto...
2010 Carnegie Mellon Robotics Academy / For use with VEX Robotics Sy
by karlyn-bohler
“end” of the Labyrinth. The robot mu...
everlasting
by stefany-barnette
THE LOITERERS and OTHER POEMS By LOUIS LEAKEY Publ...
Load More...