Institution
Amazon.com
Company•Seattle, Washington, United States•
About: Amazon.com is a company organization based out in Seattle, Washington, United States. It is known for research contribution in the topics: Computer science & Service (business). The organization has 13363 authors who have published 17317 publications receiving 266589 citations.
Topics: Computer science, Service (business), Service provider, Context (language use), Virtual machine
Papers published on a yearly basis
Papers
More filters
••
01 Jun 2019TL;DR: This work proposes a novel paired convolution to infer the semantic correlation of the pair and based on that to generate a shape mask, of which the receptive field is controlled by the shape mask that varies with the appearance of input.
Abstract: Context is essential for semantic segmentation. Due to the diverse shapes of objects and their complex layout in various scene images, the spatial scales and shapes of contexts for different objects have very large variation. It is thus ineffective or inefficient to aggregate various context information from a predefined fixed region. In this work, we propose to generate a scale- and shape-variant semantic mask for each pixel to confine its contextual region. To this end, we first propose a novel paired convolution to infer the semantic correlation of the pair and based on that to generate a shape mask. Using the inferred spatial scope of the contextual region, we propose a shape-variant convolution, of which the receptive field is controlled by the shape mask that varies with the appearance of input. In this way, the proposed network aggregates the context information of a pixel from its semantic-correlated region instead of a predefined fixed region. Furthermore, this work also proposes a labeling denoising model to reduce wrong predictions caused by the noisy low-level features. Without bells and whistles, the proposed segmentation network achieves new state-of-the-arts consistently on the six public segmentation datasets.
141 citations
•
19 Jul 2005TL;DR: In this paper, the authors describe techniques for facilitating interactions between computing systems, such as via a third-party transaction authorization system that automatically authorizes transactions between parties, in some situations, the transactions are programmatic transactions involving the use of fee-based Web services by executing application programs, with the transaction authorization systems authorizing and/or providing payments for transactions between Web service providers and consumer parties in accordance with private authorization instructions previously specified by the parties.
Abstract: Techniques are described for facilitating interactions between computing systems, such as via a third-party transaction authorization system that automatically authorizes transactions between parties. In some situations, the transactions are programmatic transactions involving the use of fee-based Web services by executing application programs, with the transaction authorization system authorizing and/or providing payments for transactions between Web service provider and consumer parties in accordance with private authorization instructions previously specified by the parties. The authorization instructions may include predefined instruction rule sets that regulate conditions under which a potential transaction can be authorized, with the instruction rule sets each referenced by an associated reference token. The transaction authorization system can then receive a reference token from each party to a potential transaction, and determine whether to authorize the transaction based on whether the instruction rule sets associated with the reference tokens are compatible or otherwise satisfied.
141 citations
•
11 Dec 2012TL;DR: In this article, power consumption for a computing device may be managed by one or more keywords, such as a keyword, network interface module and/or application processing module of the computing device.
Abstract: Power consumption for a computing device may be managed by one or more keywords. For example, if an audio input obtained by the computing device includes a keyword, a network interface module and/or an application processing module of the computing device may be activated. The audio input may then be transmitted via the network interface module to a remote computing device, such as a speech recognition server. Alternately, the computing device may be provided with a speech recognition engine configured to process the audio input for on-device speech recognition.
140 citations
••
Hans ter Steege1, Hans ter Steege2, Nigel C. A. Pitman3, Timothy J. Killeen +160 more•Institutions (57)
TL;DR: A gap analysis suggests that existing Amazonian protected areas and indigenous territories will protect viable populations of most threatened species if these areas suffer no further degradation, highlighting the key roles that protected areas, indigenous peoples, and improved governance can play in preventing large-scale extinctions in the tropics in this century.
Abstract: Estimates of extinction risk for Amazonian plant and animal species are rare and not often incorporated into land-use policy and conservation planning. We overlay spatial distribution models with historical and projected deforestation to show that at least 36% and up to 57% of all Amazonian tree species are likely to qualify as globally threatened under International Union for Conservation of Nature (IUCN) Red List criteria. If confirmed, these results would increase the number of threatened plant species on Earth by 22%. We show that the trends observed in Amazonia apply to trees throughout the tropics, and we predict that most of the world’s >40,000 tropical tree species now qualify as globally threatened. A gap analysis suggests that existing Amazonian protected areas and indigenous territories will protect viable populations of most threatened species if these areas suffer no further degradation, highlighting the key roles that protected areas, indigenous peoples, and improved governance can play in preventing large-scale extinctions in the tropics in this century.
140 citations
•
11 Oct 2006TL;DR: In this article, a transaction authorization mechanism is provided through which a transaction initiated via a first communications channel may be authorized through a second, separate communications channel or mechanism, and the target entity may then complete the transaction.
Abstract: System and method for authorizing transactions, such as payments or money transfers. A transaction authorization mechanism may be provided through which a transaction initiated via a first communications channel may be authorized through a second, separate communications channel or mechanism. A source entity may initiate a transaction to a target entity via a first communications channel to a transaction authorization service. The transaction authorization service may confirm the transaction with the source entity via a second communications channel. Various embodiments may use different communications channels, for example conventional telephone systems, mobile/cellular phone systems, and text messaging systems as the first or second communications channels. After the transaction has been authorized via the second communications channel, the transaction authorization service and/or the source entity may contact the target entity to inform the target entity of the transaction. The target entity may then complete the transaction.
140 citations
Authors
Showing all 13498 results
Name | H-index | Papers | Citations |
---|---|---|---|
Jiawei Han | 168 | 1233 | 143427 |
Bernhard Schölkopf | 148 | 1092 | 149492 |
Christos Faloutsos | 127 | 789 | 77746 |
Alexander J. Smola | 122 | 434 | 110222 |
Rama Chellappa | 120 | 1031 | 62865 |
William F. Laurance | 118 | 470 | 56464 |
Andrew McCallum | 113 | 472 | 78240 |
Michael J. Black | 112 | 429 | 51810 |
David Heckerman | 109 | 483 | 62668 |
Larry S. Davis | 107 | 693 | 49714 |
Chris M. Wood | 102 | 795 | 43076 |
Pietro Perona | 102 | 414 | 94870 |
Guido W. Imbens | 97 | 352 | 64430 |
W. Bruce Croft | 97 | 426 | 39918 |
Chunhua Shen | 93 | 681 | 37468 |