Sciweavers

8196 search results - page 1347 / 1640
» Computational Modeling and Complexity Science
Sort
View
SMA
2009
ACM
134views Solid Modeling» more  SMA 2009»
15 years 11 months ago
Exact Delaunay graph of smooth convex pseudo-circles: general predicates, and implementation for ellipses
We examine the problem of computing exactly the Delaunay graph (and the dual Voronoi diagram) of a set of, possibly intersecting, smooth convex pseudo-circles in the Euclidean pla...
Ioannis Z. Emiris, Elias P. Tsigaridas, George M. ...
VRCAI
2009
ACM
15 years 11 months ago
Segmentation of architecture shape information from 3D point cloud
Object Segmentation is an important step in object reconstruction from point cloud data of complex urban scenes and in applications to virtual environment. This paper focuses on s...
Xiaojuan Ning, Xiaopeng Zhang, Yinghui Wang, Marc ...
SASO
2008
IEEE
15 years 11 months ago
Pervasive Self-Learning with Multi-modal Distributed Sensors
Truly ubiquitous computing poses new and significant challenges. A huge number of heterogeneous devices will interact to perform complex distributed tasks. One of the key aspects...
Nicola Bicocchi, Marco Mamei, Andrea Prati, Rita C...
CCGRID
2007
IEEE
15 years 11 months ago
Analysis and Synthesis of Pseudo-Periodic Job Arrivals in Grids: A Matching Pursuit Approach
Pseudo-periodicity is one of the basic job arrival patterns on data-intensive clusters and Grids. In this paper, a signal decomposition methodology called matching pursuit is appl...
Hui Li, Richard Heusdens, Michael Muskulus, Lex Wo...
ICDCS
2007
IEEE
15 years 11 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee
« Prev « First page 1347 / 1640 Last » Next »