Sciweavers

15792 search results - page 3131 / 3159
» Computational Abstraction Steps
Sort
View
ACTA
1998
81views more  ACTA 1998»
13 years 7 months ago
Dijkstra-Scholten Predicate Calculus: Concepts and Misconceptions
The paper focusses on the logical backgrounds of the Dijkstra-Scholten program development style for correct programs. For proving the correctness of a program (i.e. the fact that...
Lex Bijlsma, Rob Nederpelt
IJDAR
2002
116views more  IJDAR 2002»
13 years 7 months ago
Performance evaluation of pattern classifiers for handwritten character recognition
Abstract. This paper describes a performance evaluation study in which some efficient classifiers are tested in handwritten digit recognition. The evaluated classifiers include a s...
Cheng-Lin Liu, Hiroshi Sako, Hiromichi Fujisawa
INTERNET
2002
145views more  INTERNET 2002»
13 years 7 months ago
Where is Middleware?
stract level, remote procedure calls enable programmers to invoke (possibly remote) services as if they were intra-application procedure calls. Much like function or procedure call...
Steve Vinoski
CORR
1999
Springer
222views Education» more  CORR 1999»
13 years 7 months ago
Analysis of approximate nearest neighbor searching with clustered point sets
Abstract. Nearest neighbor searching is a fundamental computational problem. A set of n data points is given in real d-dimensional space, and the problem is to preprocess these poi...
Songrit Maneewongvatana, David M. Mount
JUCS
2002
116views more  JUCS 2002»
13 years 7 months ago
Bounded Flooding Routing Algorithm for Provisioning the Globally Optimal Route in a Hierarchical ATM Network
: ATM virtual path (VP) contains bundles of virtual channels (VCs). A VP layer network can be used as a server layer network of VC layer networks and each VC layer network can be a...
Daniel Won-Kyu Hong, Choong Seon Hong, Dong-Sik Yu...
« Prev « First page 3131 / 3159 Last » Next »