Sciweavers

562 search results - page 79 / 113
» Dependency Pairs Revisited
Sort
View
WFLP
2009
Springer
277views Algorithms» more  WFLP 2009»
15 years 6 months ago
Termination of Context-Sensitive Rewriting with Built-In Numbers and Collection Data Structures
Context-sensitive rewriting is a restriction of rewriting that can be used to elegantly model declarative specification and programming languages such as Maude. Furthermore, it ca...
Stephan Falke, Deepak Kapur
ESA
2009
Springer
129views Algorithms» more  ESA 2009»
15 years 6 months ago
Dynamic vs. Oblivious Routing in Network Design
Consider the robust network design problem of finding a minimum cost network with enough capacity to route all traffic demand matrices in a given polytope. We investigate the impa...
Navin Goyal, Neil Olver, F. Bruce Shepherd
MOBICOM
2009
ACM
15 years 6 months ago
Connectivity of cognitive radio networks: proximity vs. opportunity
We address the connectivity of large-scale ad hoc cognitive radio networks, where secondary users exploit channels temporarily and locally unused by primary users and the existenc...
Wei Ren, Qing Zhao, Ananthram Swami
ICIP
2008
IEEE
15 years 6 months ago
On the security of non-forgeable robust hash functions
In many applications, it is often desirable to extract a consistent key from a multimedia object (e.g., an image), even when the object has gone through a noisy channel. For examp...
Qiming Li, Sujoy Roy
ICPR
2008
IEEE
15 years 6 months ago
Registration by using a pseudo color attribute
This paper presents a new variant of the classical Iterative Closest Point (ICP) algorithm. The ICP result depends heavily on the matching between 3D points of the two cloud of po...
Felipe Trujillo-Romero, Michel Devy