Sciweavers

6796 search results - page 1061 / 1360
» Java for Embedded Systems
Sort
View
ALGORITHMICA
2010
164views more  ALGORITHMICA 2010»
15 years 4 months ago
Space Efficient Algorithms for the Burrows-Wheeler Backtransformation
The Burrows-Wheeler transformation is used for effective data compression, e.g., in the well known program bzip2. Compression and decompression are done in a block-wise fashion; la...
Ulrich Lauther, Tamás Lukovszki
CONSTRAINTS
2008
89views more  CONSTRAINTS 2008»
15 years 4 months ago
A Reinforcement Learning Approach to Interval Constraint Propagation
When solving systems of nonlinear equations with interval constraint methods, it has often been observed that many calls to contracting operators do not participate actively to th...
Frédéric Goualard, Christophe Jerman...
ENTCS
2008
102views more  ENTCS 2008»
15 years 4 months ago
Programming Languages For Interactive Computing
Traditional programming languages are algorithmic: they are best suited to writing programs that acquire all their inputs before executing and only produce a result on termination...
Roly Perera
IJNSEC
2008
98views more  IJNSEC 2008»
15 years 4 months ago
A New General Transparency Model for Block-based Watermarking Method
Blocking artifact is one of the main drawbacks of the block-based watermarking method. Though a number of researches on "transparent" digital watermarking system have be...
Fangjun Huang
IVS
2008
90views more  IVS 2008»
15 years 4 months ago
Jigsaw: supporting investigative analysis through interactive visualization
Investigative analysts who work with collections of text documents connect embedded threads of evidence in order to formulate hypotheses about plans and activities of potential in...
John T. Stasko, Carsten Görg, Zhicheng Liu
« Prev « First page 1061 / 1360 Last » Next »