Sciweavers

1529 search results - page 60 / 306
» A slant removal algorithm
Sort
View
CONEXT
2010
ACM
13 years 8 months ago
Assessing the vulnerability of replicated network services
Client-server networks are pervasive, fundamental, and include such key networks as the Internet, power grids, and road networks. In a client-server network, clients obtain a serv...
George Dean Bissias, Brian Neil Levine, Ramesh K. ...
TABLEAUX
2007
Springer
14 years 4 months ago
Axiom Pinpointing in General Tableaux
Axiom pinpointing has been introduced in description logics (DLs) to help the user to understand the reasons why consequences hold and to remove unwanted consequences by computing ...
Franz Baader, Rafael Peñaloza
ACCV
1998
Springer
14 years 3 months ago
Detection and Enhancement of Small Masses via Precision Multiscale Analysis
Abstract. We introduce a continuous scale wavelet detector. Our algorithm was able to detect a mass that could not be seen using conventional windowing and leveling or traditional ...
Dongwei Chen, Chun-Ming Chang, Andrew Laine
ACL
1990
13 years 12 months ago
Polynomial Time Parsing of Combinatory Categorial Grammars
In this paper we present a polynomial time parsing algorithm for Combinatory Categorial Grammar. The recognition phase extends the CKY algorithm for CFG. The process of generating...
K. Vijay-Shanker, David J. Weir
CSC
2008
14 years 6 days ago
Efficient and Effective Practical Algorithms for the Set-Covering Problem
- The set-covering problem is an interesting problem in computational complexity theory. In [1], the setcovering problem has been proved to be NP hard and a greedy heuristic algori...
Qi Yang, Jamie McPeek, Adam Nofsinger