Sciweavers

1716 search results - page 289 / 344
» Proving Conditional Termination
Sort
View
PAMI
2006
145views more  PAMI 2006»
15 years 21 days ago
Convergent Tree-Reweighted Message Passing for Energy Minimization
Algorithms for discrete energy minimization are of fundamental importance in computer vision. In this paper we focus on the recent technique proposed by Wainwright et al. [33] - t...
Vladimir Kolmogorov
125
Voted
IJAHUC
2007
111views more  IJAHUC 2007»
15 years 21 days ago
Configuring node status in a two-phase tightly integrated mode for wireless sensor networks
: In wireless sensor networks, one of the main design challenges is to save severely constrained energy resources and obtain a long system lifetime. Low cost of sensors enables us ...
Di Tian, Zhijun Lei, Nicolas D. Georganas
98
Voted
SIAMSC
2008
116views more  SIAMSC 2008»
15 years 21 days ago
A New Asymptotic Preserving Scheme Based on Micro-Macro Formulation for Linear Kinetic Equations in the Diffusion Limit
We propose a new numerical scheme for linear transport equations. It is based on a decomposition of the distribution function into equilibrium and non-equilibrium parts. We also us...
Mohammed Lemou, Luc Mieussens
91
Voted
ACTA
2005
87views more  ACTA 2005»
15 years 21 days ago
Hybrid networks of evolutionary processors are computationally complete
A hybrid network of evolutionary processors (an HNEP) consists of several language processors which are located in the nodes of a virtual graph and able to perform only one type o...
Erzsébet Csuhaj-Varjú, Carlos Mart&i...
ISCI
2007
135views more  ISCI 2007»
15 years 20 days ago
Generalising the array split obfuscation
An obfuscation is a behaviour-preserving program transformation whose aim is to make a program “harder to understand”. Obfuscations are mainly applied to make reverse engineer...
Stephen Drape