Sciweavers

2539 search results - page 171 / 508
» Debugging Method Names
Sort
View
118
Voted
SODA
2010
ACM
238views Algorithms» more  SODA 2010»
16 years 4 days ago
How good is the Chord algorithm?
The Chord algorithm is a popular, simple method for the succinct approximation of curves, which is widely used, under different names, in a variety of areas, such as, multiobjecti...
Constantinos Daskalakis, Ilias Diakonikolas, Mihal...
176
Voted
QUANTUMCOMM
2009
Springer
15 years 9 months ago
Improvement of Lattice-Based Cryptography Using CRT
Abstract. In this paper, we first critically analyze two existing latticebased cryptosystems, namely GGH and Micciancio, and identify their drawbacks. Then, we introduce a method ...
Thomas Plantard, Mike Rose, Willy Susilo
SPIRE
2009
Springer
15 years 9 months ago
Directly Addressable Variable-Length Codes
We introduce a symbol reordering technique that implicitly synchronizes variable-length codes, such that it is possible to directly access the i-th codeword without need of any sam...
Nieves R. Brisaboa, Susana Ladra, Gonzalo Navarro
115
Voted
CISIM
2008
IEEE
15 years 9 months ago
Tensor Decomposition for 3D Bars Problem
In this paper, we compare performance of several dimension reduction techniques, namely SVD, NMF and SDD.The qualitative comparison is evaluated on a collection of bars. We compare...
Jan Platos, Jana Kocibova, Pavel Krömer, Pave...
ICPR
2008
IEEE
15 years 9 months ago
Face recognition using Complete Fuzzy LDA
In this paper, we propose a novel method for feature extraction and recognition, namely, Complete Fuzzy LDA (CFLDA). CFLDA combines the complete LDA and fuzzy set theory. CFLDA re...
Wankou Yang, Hui Yan, Jianguo Wang, Jingyu Yang