Sciweavers

363 search results - page 55 / 73
» About paths with two blocks
Sort
View
ICIP
2009
IEEE
14 years 11 months ago
Security Evaluation Of Informed Watermarking Schemes
In this paper, security evaluation of an important watermarking class based on quantization is given. Theoretical developments and practical simulations are used to measure the se...
VLSID
2007
IEEE
100views VLSI» more  VLSID 2007»
14 years 10 months ago
Hardware Efficient Piecewise Linear Branch Predictor
Piecewise linear branch predictor has been demonstrated to have superior prediction accuracy; however, its huge hardware overhead prevents the predictor from being practical in the...
Jiajin Tu, Jian Chen, Lizy K. John
PODS
2008
ACM
143views Database» more  PODS 2008»
14 years 10 months ago
XPath, transitive closure logic, and nested tree walking automata
We consider the navigational core of XPath, extended with two operators: the Kleene star for taking the transitive closure of path expressions, and a subtree relativisation operat...
Balder ten Cate, Luc Segoufin
ICRA
2007
IEEE
137views Robotics» more  ICRA 2007»
14 years 4 months ago
Decidability of Motion Planning with Differential Constraints
— Classical path planning does not address many of the challenges of robotic systems subject to differential constraints. While there have been many recent efforts to develop mot...
Peng Cheng, George J. Pappas, Vijay Kumar
MMB
2004
Springer
128views Communications» more  MMB 2004»
14 years 3 months ago
Coexistence of Various Topology Aggregation Methods in a Hierarchical Network
Quality of Service (QoS) routing methods are expected to replace existing routing protocols in future QoS-based data networks. QoS routing allows the selection of feasible paths f...
Karol Kowalik, Martin Collier