Sciweavers

429 search results - page 39 / 86
» Permutative Additives and Exponentials
Sort
View
ICASSP
2008
IEEE
15 years 11 months ago
Symbol graph based discriminative training and rescoring for improved math symbol recognition
In the symbol recognition stage of online handwritten math expression recognition, the one-pass dynamic programming algorithm can produce high-quality symbol graphs in addition of...
Zhen Xuan Luo, Yu Shi, Frank K. Soong
RTSS
2008
IEEE
15 years 11 months ago
Priority Assignment for Real-Time Wormhole Communication in On-Chip Networks
—Wormhole switching with fixed priority preemption has been proposed as a possible solution for real-time on-chip communication. However, none of current priority assignment pol...
Zheng Shi, Alan Burns
ICRA
2007
IEEE
161views Robotics» more  ICRA 2007»
15 years 11 months ago
Manipulation Planning Among Movable Obstacles
— This paper presents the ResolveSpatialConstraints (RSC) algorithm for manipulation planning in a domain with movable obstacles. Empirically we show that our algorithm quickly g...
Mike Stilman, Jan-Ullrich Schamburek, James Kuffne...
118
Voted
CSL
2007
Springer
15 years 11 months ago
Propositional Logic for Circuit Classes
Abstract. By introducing a parallel extension rule that is aware of independence of the introduced extension variables, a calculus for quantified propositional logic is obtained w...
Klaus Aehlig, Arnold Beckmann
DEXA
2007
Springer
141views Database» more  DEXA 2007»
15 years 11 months ago
Indexing Set-Valued Attributes with a Multi-level Extendible Hashing Scheme
We present an access method for set-valued attributes that is based on a multi-level extendible hashing scheme. This scheme avoids exponential directory growth for skewed data and...
Sven Helmer, Robin Aly, Thomas Neumann, Guido Moer...