Sciweavers

24529 search results - page 4508 / 4906
» Computing on Authenticated Data
Sort
View
CORR
2008
Springer
126views Education» more  CORR 2008»
15 years 5 months ago
3D Building Model Fitting Using A New Kinetic Framework
We describe a new approach to fit the polyhedron describing a 3D building model to the point cloud of a Digital Elevation Model (DEM). We introduce a new kinetic framework that hi...
Mathieu Brédif, Didier Boldo, Marc Pierrot ...
CORR
2008
Springer
113views Education» more  CORR 2008»
15 years 5 months ago
A Functional Hitchhiker's Guide to Hereditarily Finite Sets, Ackermann Encodings and Pairing Functions
The paper is organized as a self-contained literate Haskell program that implements elements of an executable finite set theory with focus on combinatorial generation and arithmet...
Paul Tarau
CORR
2008
Springer
227views Education» more  CORR 2008»
15 years 5 months ago
An experimental analysis of Lemke-Howson algorithm
We present an experimental investigation of the performance of the Lemke-Howson algorithm, which is the most widely used algorithm for the computation of a Nash equilibrium for bi...
Bruno Codenotti, Stefano De Rossi, Marino Pagan
CORR
2008
Springer
107views Education» more  CORR 2008»
15 years 5 months ago
A Spectral Algorithm for Learning Hidden Markov Models
Hidden Markov Models (HMMs) are one of the most fundamental and widely used statistical tools for modeling discrete time series. In general, learning HMMs from data is computation...
Daniel Hsu, Sham M. Kakade, Tong Zhang
168
Voted
DEBU
2010
170views more  DEBU 2010»
15 years 5 months ago
Roads Belong in Databases
The popularity of location-based services and the need to perform real-time processing on them has led to an interest in queries on road networks, such as finding shortest paths a...
Jagan Sankaranarayanan, Hanan Samet
« Prev « First page 4508 / 4906 Last » Next »