Sciweavers

29152 search results - page 5802 / 5831
» A Model of Computation for MapReduce
Sort
View
140
Voted
CGF
2007
98views more  CGF 2007»
15 years 3 months ago
Distance-Ranked Connectivity Compression of Triangle Meshes
We present a new, single-rate method for compressing the connectivity information of a connected 2-manifold triangle mesh with or without boundary. Traditional compression schemes...
Patrick Marais, James E. Gain, D. Shreiner
126
Voted
COR
2007
86views more  COR 2007»
15 years 3 months ago
Sourcing with random yields and stochastic demand: A newsvendor approach
We studied a supplier selection problem, where a buyer, while facing random demand, is to decide ordering quantities from a set of suppliers with different yields and prices.We pr...
Shitao Yang, Jian Yang, Layek Abdel-Malek
163
Voted
JAR
2000
145views more  JAR 2000»
15 years 3 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
127
Voted
JCT
2000
111views more  JCT 2000»
15 years 3 months ago
Immanants and Finite Point Processes
Givena Hermitian,non-negativede nitekernelK and a character of the symmetric group on n letters, de ne the corresponding immanant function K x1;::: ;xn := P Qn i=1 Kxi;x i, where ...
Persi Diaconis, Steven N. Evans
139
Voted
JHSN
2000
112views more  JHSN 2000»
15 years 3 months ago
A hierarchical Quality of Service control architecture for configurable multimedia applications
In order to achieve the best application-level Quality-of-Service (QoS), multimedia applications need to be dynamically tuned and reconfigured to adapt to fluctuating computing an...
Baochun Li, William Kalter, Klara Nahrstedt
« Prev « First page 5802 / 5831 Last » Next »