Sciweavers

2340 search results - page 61 / 468
» Second quarter 2008
Sort
View
CORR
2008
Springer
116views Education» more  CORR 2008»
14 years 12 months ago
A computational approach to the covert and overt deployment of spatial attention
Popular computational models of visual attention tend to neglect the influence of saccadic eye movements whereas it has been shown that the primates perform on average three of th...
Jérémy Fix, Nicolas P. Rougier, Fr&e...
CORR
2008
Springer
113views Education» more  CORR 2008»
14 years 12 months ago
Distributed Kalman Filter via Gaussian Belief Propagation
Abstract--Recent result shows how to compute distributively and efficiently the linear MMSE for the multiuser detection problem, using the Gaussian BP algorithm. In the current wor...
Danny Bickson, Ori Shental, Danny Dolev
ENDM
2010
87views more  ENDM 2010»
14 years 12 months ago
Euler Complexes (Oiks)
We present a class of instances of the existence of a second object of a specified type, in fact, of an even number of objects of a specified type, which generalizes the existence...
Jack Edmonds
ISI
2008
Springer
14 years 11 months ago
Summary management in unstructured P2P systems
In this paper, we propose managing data summaries in unstructured P2P systems. Our summaries are intelligible views with two main virtues. First, they can be directly queried and u...
Rabab Hayek, Guillaume Raschia, Patrick Valduriez,...
SIGCSE
2008
ACM
108views Education» more  SIGCSE 2008»
14 years 11 months ago
From sockets and RMI to web services
Traditional coverage of network programming techniques in a computer networking course addresses sockets, remote procedure call, and object-oriented remote procedure call. We prop...
Mark A. Holliday, J. Traynham Houston, E. Matthew ...