Sciweavers

5740 search results - page 974 / 1148
» Application of Level Set Methods in Computer Vision
Sort
View
MFCS
1997
Springer
15 years 6 months ago
Resolution Proofs, Exponential Bounds, and Kolmogorov Complexity
We prove an exponential lower bound for the length of any resolution proof for the same set of clauses as the one used by Urquhart [13]. Our contribution is a significant simpli...
Uwe Schöning
127
Voted
GG
2010
Springer
15 years 2 months ago
Verification of Graph Transformation Systems with Context-Free Specifications
We introduce an analysis method for graph transformation systems which checks that certain forbidden graphs are not reachable from the start graph. These forbidden graphs are speci...
Barbara König, Javier Esparza
139
Voted
COLING
2010
14 years 9 months ago
Shallow Information Extraction from Medical Forum Data
We study a novel shallow information extraction problem that involves extracting sentences of a given set of topic categories from medical forum data. Given a corpus of medical fo...
Parikshit Sondhi, Manish Gupta, ChengXiang Zhai, J...
106
Voted
IEEEPACT
2006
IEEE
15 years 8 months ago
Overlapping dependent loads with addressless preload
Modern out-of-order processors with non-blocking caches exploit Memory-Level Parallelism (MLP) by overlapping cache misses in a wide instruction window. The exploitation of MLP, h...
Zhen Yang, Xudong Shi, Feiqi Su, Jih-Kwon Peir
ETT
2002
89views Education» more  ETT 2002»
15 years 2 months ago
Delay analysis of a probabilistic priority discipline
In computer networks, the Strict Priority (SP) discipline is perhaps the most common and simplest method to schedule packets from different classes of applications, each with diver...
Yuming Jiang, Chen-Khong Tham, Chi Chung Ko