Sciweavers

2290 search results - page 385 / 458
» Extensible Protected Types
Sort
View
130
Voted
GPCE
2009
Springer
15 years 9 days ago
Generating safe template languages
Template languages are widely used within generative programming, because they provide intuitive means to generate software artefacts expressed in a specific object language. Howe...
Florian Heidenreich, Jendrik Johannes, Mirko Seife...
142
Voted
ICASSP
2009
IEEE
15 years 9 days ago
Robust Bayesian tracking on Riemannian manifolds via fragments-based representation
Recently, the covariance region descriptor [1] has been proved robust and versatile for a modest computational cost. It enables efficient fusion of different types of features. Ba...
Yi Wu, Jinqiao Wang, Hanqing Lu
151
Voted
ICDE
2009
IEEE
178views Database» more  ICDE 2009»
15 years 8 days ago
Efficient Query Evaluation over Temporally Correlated Probabilistic Streams
Many real world applications such as sensor networks and other monitoring applications naturally generate probabilistic streams that are highly correlated in both time and space. ...
Bhargav Kanagal, Amol Deshpande
129
Voted
ICMLA
2009
15 years 8 days ago
Sensitivity Analysis of POMDP Value Functions
In sequential decision making under uncertainty, as in many other modeling endeavors, researchers observe a dynamical system and collect data measuring its behavior over time. The...
Stéphane Ross, Masoumeh T. Izadi, Mark Merc...
CMA
2010
183views more  CMA 2010»
14 years 11 months ago
Ramanujan's class invariants and their use in elliptic curve cryptography
Complex Multiplication (CM) method is a frequently used method for the generation of elliptic curves (ECs) over a prime field Fp. The most demanding and complex step of this metho...
Elisavet Konstantinou, Aristides Kontogeorgis