Sciweavers

6059 search results - page 67 / 1212
» A Technique for Verifying Measurements
Sort
View
HPDC
2008
IEEE
15 years 1 days ago
Code coverage, performance approximation and automatic recognition of idioms in scientific applications
Basic data flow patterns which we call idioms, such as stream, transpose, reduction, random access and stencil, are common in scientific numerical applications. We hypothesize tha...
Jiahua He, Allan Snavely, Rob F. Van der Wijngaart...
DKE
2006
123views more  DKE 2006»
14 years 12 months ago
Cost models for distance joins queries using R-trees
The K-Closest-Pairs Query (K-CPQ), a type of distance join in spatial databases, discovers the K pairs of objects formed from two different datasets with the K smallest distances....
Antonio Corral, Yannis Manolopoulos, Yannis Theodo...
PERVASIVE
2008
Springer
14 years 12 months ago
A fair and energy-efficient topology control protocol for wireless sensor networks
In energy constrained wireless sensor networks, energy conservation techniques are to be applied in order to maximize the system lifetime. We tackle the problem of increasing netw...
Rami Mochaourab, Waltenegus Dargie
IJCV
2007
189views more  IJCV 2007»
14 years 11 months ago
Prior-based Segmentation and Shape Registration in the Presence of Perspective Distortion
Challenging object detection and segmentation tasks can be facilitated by the availability of a reference object. However, accounting for possible transformations between the diff...
Tammy Riklin-Raviv, Nahum Kiryati, Nir A. Sochen
IJNSEC
2007
164views more  IJNSEC 2007»
14 years 11 months ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...