Sciweavers

3108 search results - page 150 / 622
» The Elements of Computer Credibility
Sort
View
SIPS
2007
IEEE
15 years 11 months ago
Sphere Decoding for Multiprocessor Architectures
Motivated by the need for high throughput sphere decoding for multipleinput-multiple-output (MIMO) communication systems, we propose a parallel depth-first sphere decoding (PDSD)...
Qi Qi, Chaitali Chakrabarti
185
Voted
ACL2
2006
ACM
15 years 11 months ago
Unique factorization in ACL2: Euclidean domains
ACL2 is used to systematically study domains whose elements can be “uniquely” factored into products of “irreducible” elements. The best known examples of such domains are...
John R. Cowles, Ruben Gamboa
EVOW
2005
Springer
15 years 10 months ago
Automated Photogrammetric Network Design Using the Parisian Approach
We present a novel camera network design methodology based on the Parisian approach to evolutionary computation. The problem is partitioned into a set of homogeneous elements, whos...
Enrique Dunn, Gustavo Olague, Evelyne Lutton
PODC
2004
ACM
15 years 10 months ago
Load balancing and locality in range-queriable data structures
We describe a load-balancing mechanism for assigning elements to servers in a distributed data structure that supports range queries. The mechanism ensures both load-balancing wit...
James Aspnes, Jonathan Kirsch, Arvind Krishnamurth...
CHI
2010
ACM
15 years 10 months ago
Game-y information graphics
In this paper we explore the application of formal elements of games such as goals and scores to information graphics−so called “game-y” information graphics. In order to st...
Nicholas Diakopoulos