Sciweavers

2767 search results - page 350 / 554
» Universal Exponentiation Algorithm
Sort
View
ASE
2011
14 years 5 months ago
Alattin: mining alternative patterns for defect detection
Abstract To improve software quality, static or dynamic defect-detection tools accept programming rules as input and detect their violations in software as defects. As these progra...
Suresh Thummalapenta, Tao Xie
STOC
2012
ACM
217views Algorithms» more  STOC 2012»
13 years 4 months ago
Tight lower bounds for the online labeling problem
We consider the file maintenance problem (also called the online labeling problem) in which n integer items from the set {1, . . . , r} are to be stored in an array of size m ≥...
Jan Bulánek, Michal Koucký, Michael ...
229
Voted

Publication
179views
17 years 18 days ago
Characteristics of Destination Address Locality in Computer Networks: A Comparison of Caching Schemes
The size of computer networks, along with their bandwidths, is growing exponentially. To support these large, high-speed networks, it is neccessary to be able to forward packets in...
R. Jain
CVPR
2004
IEEE
16 years 4 months ago
A Rao-Blackwellized Particle Filter for EigenTracking
Subspace representations have been a popular way to model appearance in computer vision. In Jepson and Black's influential paper on EigenTracking, they were successfully appl...
Zia Khan, Tucker R. Balch, Frank Dellaert
ICCV
2003
IEEE
16 years 4 months ago
Learning How to Inpaint from Global Image Statistics
Inpainting is the problem of filling-in holes in images. Considerable progress has been made by techniques that use the immediate boundary of the hole and some prior information o...
Anat Levin, Assaf Zomet, Yair Weiss