Sciweavers

2721 search results - page 195 / 545
» An experimental analysis of Lemke-Howson algorithm
Sort
View
CHARME
2001
Springer
107views Hardware» more  CHARME 2001»
15 years 1 months ago
Using Combinatorial Optimization Methods for Quantification Scheduling
Model checking is the process of verifying whether a model of a concurrent system satisfies a specified temporal property. Symbolic algorithms based on Binary Decision Diagrams (BD...
Pankaj Chauhan, Edmund M. Clarke, Somesh Jha, Jame...
CACM
2010
105views more  CACM 2010»
14 years 10 months ago
Censored exploration and the dark pool problem
We introduce and analyze a natural algorithm for multi-venue exploration from censored data, which is motivated by the Dark Pool Problem of modern quantitative finance. We prove t...
Kuzman Ganchev, Yuriy Nevmyvaka, Michael Kearns, J...
CORR
1998
Springer
84views Education» more  CORR 1998»
14 years 10 months ago
A Variant of Earley Parsing
The Earley algorithm is a widely used parsing method in natural language processing applications. We introduce a variant of Earley parsing that is based on a “delayed” recognit...
Mark-Jan Nederhof, Giorgio Satta
CIVR
2010
Springer
227views Image Analysis» more  CIVR 2010»
14 years 7 months ago
Evaluating detection of near duplicate video segments
The automatic detection of near duplicate video segments, such as multiple takes of a scene or different news video clips showing the same event, has received growing research int...
Werner Bailer
101
Voted
IFIP12
2009
14 years 8 months ago
User Recommendations based on Tensor Dimensionality Reduction
Social Tagging is the process by which many users add metadata in the form of keywords, to annotate and categorize items (songs, pictures, web links, products etc.). Social tagging...
Panagiotis Symeonidis