Sciweavers

12264 search results - page 2279 / 2453
» Analysis of the rubberband algorithm
Sort
View
EMSOFT
2009
Springer
15 years 10 months ago
Compositional deadlock detection for rendezvous communication
Concurrent programming languages are growing in importance with the advent of multi-core systems. However, concurrent programs suffer from problems, such as data races and deadloc...
Baolin Shao, Nalini Vasudevan, Stephen A. Edwards
ESA
2009
Springer
122views Algorithms» more  ESA 2009»
15 years 10 months ago
Bounded Budget Betweenness Centrality Game for Strategic Network Formations
In this paper, we introduce the bounded budget betweenness centrality game, a strategic network formation game in which nodes build connections subject to a budget constraint in or...
Xiaohui Bei, Wei Chen, Shang-Hua Teng, Jialin Zhan...
COMPGEOM
2009
ACM
15 years 10 months ago
Persistent cohomology and circular coordinates
Nonlinear dimensionality reduction (NLDR) algorithms such as Isomap, LLE and Laplacian Eigenmaps address the problem of representing high-dimensional nonlinear data in terms of lo...
Vin de Silva, Mikael Vejdemo-Johansson
IWCMC
2009
ACM
15 years 10 months ago
Effect of feedback prediction on OFDMA system throughput
In wireless communication systems, adaptive modulation and coding (AMC) is used to improve the downlink (DL) spectral efficiency by exploiting the underlying channel condition. Ho...
Mohammad Abdul Awal, Lila Boukhatem
MM
2009
ACM
260views Multimedia» more  MM 2009»
15 years 10 months ago
Web image mining towards universal age estimator
In this paper, we present an automatic web image mining system towards building a universal human age estimator based on facial information, which is applicable to all ethnic grou...
Bingbing Ni, Zheng Song, Shuicheng Yan
« Prev « First page 2279 / 2453 Last » Next »