Sciweavers

20175 search results - page 3834 / 4035
» Is abstraction the key to computing
Sort
View
222
Voted
MAM
2011
349views Communications» more  MAM 2011»
14 years 7 months ago
An iterative logarithmic multiplier
The paper presents a new multiplier enabling achievement of an arbitrary accuracy. It follows the same idea of number representation as the Mitchell’s algorithm, but does not use...
Zdenka Babic, Aleksej Avramovic, Patricio Bulic
MTA
2011
220views Hardware» more  MTA 2011»
14 years 7 months ago
Modeling, simulation, and practice of floor control for synchronous and ubiquitous collaboration
: With the advances in a variety of software/hardware technologies and wireless networking, there is coming a need for ubiquitous collaboration which allows people to access inform...
Kangseok Kim, Geoffrey C. Fox
PAMI
2011
14 years 7 months ago
View-Independent Action Recognition from Temporal Self-Similarities
— This paper addresses recognition of human actions under view changes. We explore self-similarities of action sequences over time and observe the striking stability of such meas...
Imran N. Junejo, Emilie Dexter, Ivan Laptev, Patri...
SIAMSC
2011
151views more  SIAMSC 2011»
14 years 7 months ago
Inexact Newton Methods with Restricted Additive Schwarz Based Nonlinear Elimination for Problems with High Local Nonlinearity
The classical inexact Newton algorithm is an efficient and popular technique for solving large sparse nonlinear system of equations. When the nonlinearities in the system are wellb...
Xiao-Chuan Cai, Xuefeng Li
SIMPRA
2011
14 years 7 months ago
Virtual segment: Store-carry-forward relay-based support for wide-area non-real-time data exchange
—In the Internet of the future, a flexible, dynamic combination of wireless and wired access networks is expected to be a key driver for enlarging the broadband communication se...
Shinya Yamamura, Akira Nagata, Masato Tsuru, Hitom...
« Prev « First page 3834 / 4035 Last » Next »