Sciweavers

1242 search results - page 147 / 249
» Digital Objects as Passwords
Sort
View
IAJIT
2010
211views more  IAJIT 2010»
14 years 8 months ago
3D Model Retrieval Based on 3D Discrete Cosine Transform
: The content-based retrieval systems for 3D models on the Web become necessary since digital databases of 3D objects are growing. In this paper, we propose a new method to describ...
Elmustapha Ait Lmaati, Ahmed El Oirrak, Mohammed N...
FSTTCS
2010
Springer
14 years 8 months ago
Computing Rational Radical Sums in Uniform TC^0
A fundamental problem in numerical computation and computational geometry is to determine the sign of arithmetic expressions in radicals. Here we consider the simpler problem of d...
Paul Hunter, Patricia Bouyer, Nicolas Markey, Jo&e...
FSTTCS
2010
Springer
14 years 8 months ago
Average Analysis of Glushkov Automata under a BST-Like Model
We study the average number of transitions in Glushkov automata built from random regular expressions. This statistic highly depends on the probabilistic distribution set on the e...
Cyril Nicaud, Carine Pivoteau, Benoît Razet
WCET
2010
14 years 7 months ago
On the Use of Context Information for Precise Measurement-Based Execution Time Estimation
The present paper investigates the influence of the execution history on the precision of measurementbased execution time estimates for embedded software. A new approach to timing...
Stefan Stattelmann, Florian Martin
WCET
2010
14 years 7 months ago
Realism in Statistical Analysis of Worst Case Execution Times
This paper considers the use of Extreme Value Theory (EVT) to model worst-case execution times. In particular it considers the sacrifice that statistical methods make in the reali...
David Griffin, Alan Burns