Sciweavers

1654 search results - page 227 / 331
» Comparing Two Software Design Process Theories
Sort
View
WWW
2001
ACM
16 years 5 months ago
Batch rekeying for secure group communications
Many emerging web and Internet applications are based on a group communications model. Thus, securing group communications is an important Internet design issue. The key graph app...
Xiaozhou (Steve) Li, Yang Richard Yang, Mohamed G....
ICIP
2008
IEEE
15 years 11 months ago
Correlation Embedding Analysis
—Beyond conventional linear and kernel-based feature extraction, we present a more generalized formulation for feature extraction in this paper. Two representative algorithms usi...
Yun Fu, Thomas S. Huang
PVM
2005
Springer
15 years 10 months ago
New User-Guided and ckpt-Based Checkpointing Libraries for Parallel MPI Applications
We present design and implementation details as well as performance results for two new parallel checkpointing libraries developed by us for parallel MPI applications. The first o...
Pawel Czarnul, Marcin Fraczak
3DIM
2001
IEEE
15 years 8 months ago
Comparison of HK and SC Curvature Description Methods
This paper compares two different local surface shape description methods. The general goal of surface shape description methods is to classify different surface shapes from range...
H. Cantzler, Robert B. Fisher
CORR
2008
Springer
167views Education» more  CORR 2008»
15 years 4 months ago
Fast k Nearest Neighbor Search using GPU
Statistical measures coming from information theory represent interesting bases for image and video processing tasks such as image retrieval and video object tracking. For example...
Vincent Garcia, Eric Debreuve, Michel Barlaud