Sciweavers

747 search results - page 149 / 150
» Theory and Construction of Molecular Computers
Sort
View
IPL
2007
99views more  IPL 2007»
14 years 11 months ago
Substitutions into propositional tautologies
We prove that there is a polynomial time substitution (y1, . . . , yn) := g(x1, . . . , xk) with k << n such that whenever the substitution instance A(g(x1, . . . , xk)) of ...
Jan Krajícek
130
Voted
TIFS
2008
157views more  TIFS 2008»
14 years 11 months ago
Subspace Approximation of Face Recognition Algorithms: An Empirical Study
We present a theory for constructing linear subspace approximations to face-recognition algorithms and empirically demonstrate that a surprisingly diverse set of face-recognition a...
Pranab Mohanty, Sudeep Sarkar, Rangachar Kasturi, ...
JCT
2000
111views more  JCT 2000»
14 years 11 months ago
Immanants and Finite Point Processes
Givena Hermitian,non-negativede nitekernelK and a character of the symmetric group on n letters, de ne the corresponding immanant function K x1;::: ;xn := P Qn i=1 Kxi;x i, where ...
Persi Diaconis, Steven N. Evans
UMUAI
1998
119views more  UMUAI 1998»
14 years 11 months ago
COLLAGEN: A Collaboration Manager for Software Interface Agents
We have implemented an application-independent collaboration manager, called Collagen, based on the SharedPlan theory of discourse, and used it to build a software interface agent...
Charles Rich, Candace L. Sidner
ENTCS
2008
153views more  ENTCS 2008»
14 years 11 months ago
Efficient Conflict Detection in Graph Transformation Systems by Essential Critical Pairs
The well-known notion of critical pairs already allows a static conflict detection, which is important for all kinds of applications and already implemented in AGG. Unfortunately ...
Leen Lambers, Hartmut Ehrig, Fernando Orejas