×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [msr slide]
Retinex Image Enhancement Techniques --- Algorithm, Application and Advantages Prepared by: Zhixi Bian and Yan Zhang
229 views
A Survey about Performance Counters, Libraries and Tools Joseph Bryant Manzano Franco
217 views
Seesaw Personalized Web Search Jaime Teevan, MIT with Susan T. Dumais and Eric Horvitz, MSR
218 views
Computationally Sound Symbolic Protocol Analysis: Correspondence Theorems 18739A: Foundations of Security and Privacy Anupam Datta CMU Fall 2007-08
238 views
Information Retrieval and Question- Answering Julia Hirschberg CS 4705
222 views
Chapter 9 Sex allocation/(ratio) distorters. Sex ratio distorters The ESS SR may differ between the point of view of different genes within an individualconflict
220 views
Two Aspects of the Problem of Natural Language Inference Bill MacCartney NLP Group Stanford University 8 October 2008
217 views
September 17 th, 2001FOSAD 2001 – Bertinoro, Italy Security Protocol Specification Languages Iliano Cervesato
[email protected]
ITT Industries, Inc
215 views
3D Computer Vision and Video Computing 3D Vision Lecture 16 Visual Motion (I) CSC Capstone Fall 2004 Zhigang Zhu, NAC 8/203A zhu
230 views
7/14/2006UAI06-Inference EvaluationPage 1 UAI 2006 report from the 1 st Evaluation of Probabilistic Inference July 14 th, 2006 B,C,D,F F,D,G D,F
215 views
Logics for Security Protocols Anupam Datta Fall 2007-08 18739A: Foundations of Security and Privacy
217 views
3D Computer Vision and Video Computing 3D Vision Topic 8 of Part 2 Visual Motion (II) CSC I6716 Spring 2004 Zhigang Zhu, NAC 8/203A zhu/VisionCourse-2004.html
220 views
< Prev
Next >