Sciweavers

2316 search results - page 87 / 464
» The many forms of hypercomputation
Sort
View
ENTCS
2002
77views more  ENTCS 2002»
15 years 4 months ago
The variety of variables in computer-aided real-time programming
The refinement calculus is a well-established theory for translating specifications to program code. Recent research has extended the calculus to handle real-time requirements and...
Luke Wildman, Colin J. Fidge
CG
1999
Springer
15 years 4 months ago
Tribox bounds for three-dimensional objects
A convexhull H(S)of a 3Dset S is rarely used to accelerateinterferencedetection or as a substitutefor rendering small projection of S,because it typically has too many faces. An a...
A. Crosnier, Jarek Rossignac
KBS
2002
141views more  KBS 2002»
15 years 4 months ago
Using J-pruning to reduce overfitting in classification trees
The automatic induction of classification rules from examples in the form of a decision tree is an important technique used in data mining. One of the problems encountered is the o...
Max Bramer
JUCS
2010
129views more  JUCS 2010»
15 years 3 months ago
An Extensible Interpreter Framework for Software Transactional Memory
: Software transactional memory (STM) is a new approach for coordinating concurrent threads, for which many different implementation strategies are currently being researched. In ...
Charlotte Herzeel, Pascal Costanza, Theo D'Hondt
162
Voted
ICICS
2010
Springer
15 years 2 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran