Sciweavers

7978 search results - page 1334 / 1596
» Combining shared-coin algorithms
Sort
View
ACII
2005
Springer
15 years 6 months ago
A Novel Regularized Fisher Discriminant Method for Face Recognition Based on Subspace and Rank Lifting Scheme
The null space N(St) of total scatter matrix St contains no useful information for pattern classification. So, discarding the null space N(St) results in dimensionality reduction ...
Wen-Sheng Chen, Pong Chi Yuen, Jian Huang, Jian-Hu...
APN
2006
Springer
15 years 6 months ago
Invariant Based Programming
Program verification is usually done by adding specifications and invariants to the program and then proving that the verification conditions are all true. This makes program verif...
Ralph-Johan Back
CIKM
2006
Springer
15 years 6 months ago
Processing relaxed skylines in PDMS using distributed data summaries
Peer Data Management Systems (PDMS) are a natural extension of heterogeneous database systems. One of the main tasks in such systems is efficient query processing. Insisting on co...
Katja Hose, Christian Lemke, Kai-Uwe Sattler
DAC
2005
ACM
15 years 6 months ago
Efficient and accurate gate sizing with piecewise convex delay models
We present an efficient and accurate gate sizing tool that employs a novel piecewise convex delay model, handling both rise and fall delays, for static CMOS gates. The delay model...
Hiran Tennakoon, Carl Sechen
ADAPTIVE
2007
Springer
15 years 6 months ago
Personalized Search on the World Wide Web
With the exponential growth of the available information on the World Wide Web, a traditional search engine, even if based on sophisticated document indexing algorithms, has diffi...
Alessandro Micarelli, Fabio Gasparetti, Filippo Sc...
« Prev « First page 1334 / 1596 Last » Next »