Sciweavers

801 search results - page 27 / 161
» Robust Nonproprietary Software
Sort
View
MUE
2007
IEEE
119views Multimedia» more  MUE 2007»
15 years 3 months ago
Building Scalable and Robust Architecture for Ubiquitous Sensor Networks with the help of Design Patterns
Design patterns address a recurring design problem for a specific situation, and present a solution. Design patterns have proven useful in many engineering disciplines such as Sof...
Syed Obaid Amin, Muhammad Shoaib Siddiqui, Choong ...
UIST
2006
ACM
15 years 3 months ago
Robust computer vision-based detection of pinching for one and two-handed gesture input
We present a computer vision technique to detect when the user brings their thumb and forefinger together (a pinch gesture) for close-range and relatively controlled viewing circu...
Andrew D. Wilson
PRDC
1999
IEEE
15 years 1 months ago
Experimental Assessment of COTS DBMS Robustness under Transient Faults
This paper evaluates the behavior of a common off-theshelf (COTS) database management system (DBMS) in presence of transient faults. Database applications have traditionally been ...
Diamantino Costa, Henrique Madeira
COMPGEOM
1996
ACM
15 years 1 months ago
Robust Adaptive Floating-Point Geometric Predicates
Fast C implementations of four geometric predicates, the 2D and 3D orientation and incircle tests, are publicly available. Their inputs are ordinary single or double precision flo...
Jonathan Richard Shewchuk
ESA
2008
Springer
129views Algorithms» more  ESA 2008»
14 years 11 months ago
More Robust Hashing: Cuckoo Hashing with a Stash
Cuckoo hashing holds great potential as a high-performance hashing scheme for real applications. Up to this point, the greatest drawback of cuckoo hashing appears to be that there...
Adam Kirsch, Michael Mitzenmacher, Udi Wieder