Sciweavers

1548 search results - page 302 / 310
» Computational Approaches to Sentence Completion
Sort
View
CASES
2004
ACM
14 years 27 days ago
Hardware assisted control flow obfuscation for embedded processors
+ With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transa...
Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, San...
ICALP
2004
Springer
14 years 25 days ago
The Black-Box Complexity of Nearest Neighbor Search
We define a natural notion of efficiency for approximate nearest-neighbor (ANN) search in general n-point metric spaces, namely the existence of a randomized algorithm which answ...
Robert Krauthgamer, James R. Lee
SENSYS
2003
ACM
14 years 21 days ago
Timing-sync protocol for sensor networks
Wireless ad-hoc sensor networks have emerged as an interesting and important research area in the last few years. The applications envisioned for such networks require collaborati...
Saurabh Ganeriwal, Ram Kumar, Mani B. Srivastava
ICARCV
2002
IEEE
109views Robotics» more  ICARCV 2002»
14 years 12 days ago
Quantized wavelet features and support vector machines for on-road vehicle detection
The focus of this work is on the problem of feature selection and classification for on-road vehicle detection. In particular, we propose using quantized Haar wavelet features an...
Zehang Sun, George Bebis, Ronald Miller
CDC
2009
IEEE
156views Control Systems» more  CDC 2009»
14 years 5 days ago
The nullspace method - a unifying paradigm to fault detection
— The nullspace method is a powerful framework to solve the synthesis problem of fault detection filters in the most general setting. It is also well suited to address the least...
András Varga