Sciweavers

1845 search results - page 258 / 369
» Computing the Angularity Tolerance
Sort
View
JSW
2006
98views more  JSW 2006»
15 years 22 days ago
A Jxta Based Asynchronous Peer-to-Peer Implementation of Genetic Programming
Abstract-- Solving complex real-world problems using evolutionary computation is a CPU time-consuming task that requires a large amount of computational resources. Peerto-Peer (P2P...
Gianluigi Folino, Agostino Forestiero, Giandomenic...
TCAD
2002
107views more  TCAD 2002»
15 years 12 days ago
Value-sensitive automatic code specialization for embedded software
The objective of this work is to create a framework for the optimization of embedded software. We present algorithms and a tool flow to reduce the computational effort of programs,...
Eui-Young Chung, Luca Benini, Giovanni De Micheli,...
84
Voted
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
14 years 10 months ago
A DAA Scheme Requiring Less TPM Resources
Abstract. Direct anonymous attestation (DAA) is a special digital signature primitive, which provides a balance between signer authentication and privacy. One of the most interesti...
Liqun Chen
HCI
2009
14 years 10 months ago
A Similarity Measure for Vision-Based Sign Recognition
When we encounter an English word that we do not understand, we can look it up in a dictionary. However, when an American Sign Language (ASL) user encounters an unknown sign, looki...
Haijing Wang, Alexandra Stefan, Vassilis Athitsos
127
Voted
CIARP
2010
Springer
14 years 7 months ago
Comparison of Shape Descriptors for Mice Behavior Recognition
Shape representation provides fundamental features for many applications in computer vision and it is known to be important cues for human vision. This paper presents an experiment...
Jonathan de Andrade Silva, Wesley Nunes Gonç...