Sciweavers

1845 search results - page 178 / 369
» Computing the Angularity Tolerance
Sort
View
111
Voted
ICPR
2008
IEEE
16 years 4 months ago
Script identification of camera-based images
This paper reports a statistical script identification technique that determines the script of document images, especially camera-based images which suffer from perspective distor...
Chew Lim Tan, Linlin Li
124
Voted
ICCS
2009
Springer
15 years 10 months ago
Hiding Communication Latency with Non-SPMD, Graph-Based Execution
Reformulating an algorithm to mask communication delays is crucial in maintaining scalability, but traditional solutions embed the overlap strategy into the application. We present...
Jacob Sorensen, Scott B. Baden
109
Voted
EUC
2005
Springer
15 years 9 months ago
Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow
Abstract. For the security technology that has been achieved with software in the computer system and the protection of the intellectual property right of software, software protec...
Tatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakura...
IPTPS
2005
Springer
15 years 9 months ago
A Self-repairing Peer-to-Peer System Resilient to Dynamic Adversarial Churn
We present a dynamic distributed hash table where peers may join and leave at any time. Our system tolerates a powerful adversary which has complete visibility of the entire state ...
Fabian Kuhn, Stefan Schmid, Roger Wattenhofer
123
Voted
ARITH
1999
IEEE
15 years 8 months ago
Arithmetic with Signed Analog Digits
This paper presents mathematical foundtions of the Overlap Resolution Number System (ORNS) which employs signed Continuous Valued Digits (CVD's). ORNS is a redundant Number S...
Aryan Saed, Majid Ahmadi, Graham A. Jullien