Sciweavers

542 search results - page 13 / 109
» The Denjoy alternative for computable functions
Sort
View
HICSS
2007
IEEE
87views Biometrics» more  HICSS 2007»
15 years 3 months ago
A Semantic Recognizer Infrastructure for Computing Loop Behavior
Next-generation software engineering is envisioned as a computational discipline that complements human capability through automated computation of software behavior and propertie...
Ali Mili, Tim Daly, Mark Pleszkoch, Stacy J. Prowe...
87
Voted
DEXAW
2005
IEEE
127views Database» more  DEXAW 2005»
15 years 3 months ago
A Key Establishment IP-Core for Ubiquitous Computing
A most critical and complex issue with regard to constrained devices in the ubiquitous and pervasive computing setting is secure key exchange. The restrictions motivate the invest...
Markus Volkmer, Sebastian Wallner
DRR
2009
14 years 7 months ago
Online computation of similarity between handwritten characters
We are interested in the problem of curve identification, motivated by problems in handwriting recognition. Various geometric approaches have been proposed, with one of the most p...
Oleg Golubitsky, Stephen M. Watt
ICC
2007
IEEE
15 years 3 months ago
Computing the Optimal Amount of Constellation Distortion in OFDM Systems
Abstract— The primary disadvantage of orthogonal frequencydivision multiplexing (OFDM) is the high time-domain peak-toaverage power ratio (PAR) that severely limits the transmitt...
Alok Aggarwal, Erik R. Stauffer, Teresa H. Meng
ESA
2009
Springer
90views Algorithms» more  ESA 2009»
15 years 4 months ago
Storing a Compressed Function with Constant Time Access
We consider the problem of representing, in a space-efficient way, a function f : S → Σ such that any function value can be computed in constant time on a RAM. Specifically, ou...
Jóhannes B. Hreinsson, Morten Krøyer...