Sciweavers

2899 search results - page 522 / 580
» On the Complexity of Exclusion Algorithms for Optimization
Sort
View
TROB
2008
97views more  TROB 2008»
15 years 1 months ago
Physical Path Planning Using a Pervasive Embedded Network
Abstract--We evaluate a technique that uses an embedded network deployed pervasively throughout an environment to aid robots in navigation. The embedded nodes do not know their abs...
Keith J. O'Hara, Daniel B. Walker, Tucker R. Balch
IVS
2002
106views more  IVS 2002»
15 years 1 months ago
Pixel bar charts: a visualization technique for very large multi-attribute data sets?
Simple presentation graphics are intuitive and easy-to-use, but show only highly aggregated data presenting only a very small number of data values (as in the case of bar charts) ...
Daniel A. Keim, Ming C. Hao, Umeshwar Dayal, Meich...
TIP
1998
125views more  TIP 1998»
15 years 1 months ago
Additive vector decoding of transform coded images
—In a standard transform coding scheme of images or video, the decoder can be implemented by a table-lookup technique without the explicit use of an inverse transformation. In th...
Siu-Wai Wu, Allen Gersho
IPPS
2010
IEEE
14 years 11 months ago
Dynamic analysis of the relay cache-coherence protocol for distributed transactional memory
Transactional memory is an alternative programming model for managing contention in accessing shared in-memory data objects. Distributed transactional memory (TM) promises to alle...
Bo Zhang, Binoy Ravindran
WEBI
2010
Springer
14 years 11 months ago
Exploiting Puzzle Diversity in Puzzle Selection for ESP-Like GWAP Systems
The ESP game belongs to the genre called Games with a Purpose (GWAP), which leverage people's desire to be entertained and also outsource certain steps of the computational p...
Yu-Song Syu, Hsiao-Hsuan Yu, Ling-Jyh Chen