Sciweavers

7106 search results - page 1220 / 1422
» Restricted Complexity, General Complexity
Sort
View
123
Voted
TASLP
2002
67views more  TASLP 2002»
15 years 4 months ago
Efficient tracking of the cross-correlation coefficient
In many (audio) processing algorithms, involving manipulation of discrete-time signals, the performance can vary strongly over the repertoire that is used. This may be the case whe...
Ronald M. Aarts, Roy Irwan, Augustus J. E. M. Jans...
TON
2002
144views more  TON 2002»
15 years 4 months ago
Algorithms for provisioning virtual private networks in the hose model
Virtual Private Networks (VPNs) provide customers with predictable and secure network connections over a shared network. The recently proposed hose model for VPNs allows for great...
Amit Kumar, Rajeev Rastogi, Abraham Silberschatz, ...
TSE
2002
157views more  TSE 2002»
15 years 4 months ago
Assessing the Applicability of Fault-Proneness Models Across Object-Oriented Software Projects
A number of papers have investigated the relationships between design metrics and the detection of faults in object-oriented software. Several of these studies have shown that suc...
Lionel C. Briand, Walcélio L. Melo, Jü...
ICRA
2010
IEEE
104views Robotics» more  ICRA 2010»
15 years 3 months ago
Using model knowledge for learning inverse dynamics
— In recent years, learning models from data has become an increasingly interesting tool for robotics, as it allows straightforward and accurate model approximation. However, in ...
Duy Nguyen-Tuong, Jan Peters
140
Voted
IJLIT
2010
67views more  IJLIT 2010»
15 years 3 months ago
Interoperability-Centric Problems: New Challenges and Legal Solutions
Whereas abandonment of detailed regulation is widely asserted to be the true way along with the fluctuations of the business models and emergence of IP-based services, there are s...
Turgut Ayhan Beydogan
« Prev « First page 1220 / 1422 Last » Next »