Sciweavers

1628 search results - page 182 / 326
» Compiler Construction Using Scheme
Sort
View
136
Voted
RTSS
2006
IEEE
15 years 11 months ago
Programming Execution-Time Servers in Ada 2005
Much of the research on scheduling schemes is prevented from being used in practice by the lack of implementations vide the necessary abstractions. An example of this lack of prov...
Alan Burns, Andy J. Wellings
AVBPA
2001
Springer
134views Biometrics» more  AVBPA 2001»
15 years 8 months ago
Pose-Independent Face Identification from Video Sequences
A scheme for pose-independent face recognition is presented. An "unwrapped" texture map is constructed from a video sequence using a texture-from-motion approach, which ...
Michael C. Lincoln, Adrian F. Clark
110
Voted
ACL
2008
15 years 6 months ago
Ad Hoc Treebank Structures
We outline the problem of ad hoc rules in treebanks, rules used for specific constructions in one data set and unlikely to be used again. These include ungeneralizable rules, erro...
Markus Dickinson
IACR
2011
173views more  IACR 2011»
14 years 4 months ago
All-But-Many Lossy Trapdoor Functions
We put forward a generalization of lossy trapdoor functions (LTFs). Namely, all-but-many lossy trapdoor functions (ABM-LTFs) are LTFs that are parametrized with tags. Each tag can...
Dennis Hofheinz
TIT
2011
148views more  TIT 2011»
14 years 12 months ago
On Two-User Gaussian Multiple Access Channels With Finite Input Constellations
—Constellation Constrained (CC) capacity regions of two-user Single-Input Single-Output (SISO) Gaussian Multiple Access Channels (GMAC) are computed for several Non-Orthogonal Mu...
Jagadeesh Harshan, Bikash Sundar Rajan