Sciweavers

24529 search results - page 4678 / 4906
» Computing on Authenticated Data
Sort
View
ISMIR
2000
Springer
148views Music» more  ISMIR 2000»
15 years 7 months ago
IR for Contemporary Music: What the Musicologist Needs
Active listening is the core of musical activity Listening does not only concern receiving musical information. On the contrary, it is "active" and based on a set of int...
Alain Bonardi
159
Voted
KBSE
2000
IEEE
15 years 7 months ago
Simultaneous Checking of Completeness and Ground Confluence
c specifications provide a powerful method for the specification of abstract data types in programming languages and software systems. Completeness and ground confluence are fundam...
Adel Bouhoula
LCTRTS
2000
Springer
15 years 7 months ago
Approximation of Worst-Case Execution Time for Preemptive Multitasking Systems
The control system of many complex mechatronic products requires for each task the Worst Case Execution Time (WCET), which is needed for the scheduler's admission tests and su...
Matteo Corti, Roberto Brega, Thomas R. Gross
ICPP
1997
IEEE
15 years 7 months ago
The Affinity Entry Consistency Protocol
In this paper we propose a novel software-only distributed sharedmemory system (SW-DSM), the Affinity Entry Consistency (AEC) protocol. The protocol is based on Entry Consistency ...
Cristiana Bentes Seidel, Ricardo Bianchini, Claudi...
ICCV
1995
IEEE
15 years 7 months ago
Recognizing 3D Objects Using Photometric Invariant
In this paper we describe a new e cient algorithm for recognizing 3D objects by combining photometric and geometric invariants. Some photometric properties are derived, that are i...
Kenji Nagao
« Prev « First page 4678 / 4906 Last » Next »