Sciweavers

2620 search results - page 139 / 524
» An Evaluation Technique for Binarization Algorithms
Sort
View
ICDE
2009
IEEE
186views Database» more  ICDE 2009»
14 years 9 months ago
A Benchmark for Online Index Selection
Online approaches to physical design tuning have received considerable attention in the recent literature, with a focus on the problem of online index selection. However, it is dif...
Karl Schnaitter, Neoklis Polyzotis
CHARME
2001
Springer
107views Hardware» more  CHARME 2001»
13 years 11 months ago
Using Combinatorial Optimization Methods for Quantification Scheduling
Model checking is the process of verifying whether a model of a concurrent system satisfies a specified temporal property. Symbolic algorithms based on Binary Decision Diagrams (BD...
Pankaj Chauhan, Edmund M. Clarke, Somesh Jha, Jame...
IH
2010
Springer
13 years 6 months ago
Short Collusion-Secure Fingerprint Codes against Three Pirates
In this article, we propose a new construction of probabilistic collusion-secure fingerprint codes against up to three pirates and give a theoretical security evaluation. Our pira...
Koji Nuida
TVCG
2012
191views Hardware» more  TVCG 2012»
11 years 10 months ago
Live Speech Driven Head-and-Eye Motion Generators
—This paper describes a fully automated framework to generate realistic head motion, eye gaze, and eyelid motion simultaneously based on live (or recorded) speech input. Its cent...
Binh Huy Le, Xiaohan Ma, Zhigang Deng
COMSWARE
2007
IEEE
14 years 2 months ago
BARAKA: A Hybrid Simulator of SANETs
— We present BARAKA, a new simulator for SANETs. The evaluation of algorithms developed for communication and co-operation in this context is usually accomplished separately. On ...
Thomas Halva Labella, Isabel Dietrich, Falko Dress...