Sciweavers

14190 search results - page 2757 / 2838
» compute 2008
Sort
View
SODA
2008
ACM
104views Algorithms» more  SODA 2008»
14 years 11 months ago
Ranged hash functions and the price of churn
Ranged hash functions generalize hash tables to the setting where hash buckets may come and go over time, a typical case in distributed settings where hash buckets may correspond ...
James Aspnes, Muli Safra, Yitong Yin
ISBI
2008
IEEE
15 years 10 months ago
Quantitative genetic modeling of lateral ventricular shape and volume using multi-atlas fluid image alignment in twins
Despite substantial progress in measuring the 3D profile of anatomical variations in the human brain, their genetic and environmental causes remain enigmatic. We developed an auto...
Yi-Yu Chou, Natasha Lepore, Marina Barysheva, Ming...
SODA
2008
ACM
108views Algorithms» more  SODA 2008»
14 years 11 months ago
Price based protocols for fair resource allocation: convergence time analysis and extension to Leontief utilities
We analyze several distributed, continuous time protocols for a fair allocation of bandwidths to flows in a network (or resources to agents). Our protocols converge to an allocati...
Ashish Goel, Hamid Nazerzadeh
AES
2008
Springer
133views Cryptology» more  AES 2008»
14 years 10 months ago
Alternative neural networks to estimate the scour below spillways
Artificial neural networks (ANN's) are associated with difficulties like lack of success in a given problem and unpredictable level of accuracy that could be achieved. In eve...
H. Md. Azamathulla, M. C. Deo, P. B. Deolalikar
CGF
2007
98views more  CGF 2007»
14 years 9 months ago
Distance-Ranked Connectivity Compression of Triangle Meshes
We present a new, single-rate method for compressing the connectivity information of a connected 2-manifold triangle mesh with or without boundary. Traditional compression schemes...
Patrick Marais, James E. Gain, D. Shreiner
« Prev « First page 2757 / 2838 Last » Next »