Sciweavers

4820 search results - page 261 / 964
» Implementing Signatures for C
Sort
View
108
Voted
ACL
1993
15 years 5 months ago
Principle-Based Parsing without Overgeneration
Overgeneration is the main source of computational complexity in previous principle-based parsers. This paper presents a message passing algorithm for principle-based parsing that...
Dekang Lin
125
Voted
DAGSTUHL
1996
15 years 5 months ago
Ecological Robotics: A Schema-Theoretic Approach
lection of software tools including: NSL, a neural simulation language; ASL, an abstract schema language; and MissionLab, a schema-based mission-oriented simulation and robot imple...
Ronald C. Arkin, Francisco Cervantes-Pérez,...
129
Voted
AMC
2006
91views more  AMC 2006»
15 years 3 months ago
Fast elliptic scalar multiplication using new double-base chain and point halving
The fast implementation of elliptic curve cryptosystems relies on the efficient computation of scalar multiplication. Based on the double-base chain representation of scalar using...
Kwok-Wo Wong, Edward C. W. Lee, L. M. Cheng, Xiaof...
JAIR
2006
71views more  JAIR 2006»
15 years 3 months ago
Engineering a Conformant Probabilistic Planner
We present a partial-order, conformant, probabilistic planner, Probapop which competed in the blind track of the Probabilistic Planning Competition in IPC-4. We explain how we ada...
Nilufer Onder, G. C. Whelan, Li Li
111
Voted
JGTOOLS
2006
80views more  JGTOOLS 2006»
15 years 3 months ago
A Fast Method for Local Penetration Depth Computation
In this appendix, we provide some details on the data structures used to cluster the intersection segments. Although the data structures are fairly classical (a heap, a grid and a...
Stephane Redon, Ming C. Lin