Sciweavers

28962 search results - page 5718 / 5793
» Computational Mechanism Design
Sort
View
DAS
2010
Springer
14 years 9 days ago
Text extraction from graphical document images using sparse representation
A novel text extraction method from graphical document images is presented in this paper. Graphical document images containing text and graphics components are considered as two-d...
Thai V. Hoang, Salvatore Tabbone
HYBRID
2000
Springer
14 years 8 days ago
Beyond HYTECH: Hybrid Systems Analysis Using Interval Numerical Methods
Abstract. Sincehybridembeddedsystemsarepervasiveandoftensafetycritical, guarantees about their correct performance are desirable. The hybrid systemsmodelcheckerHyTech providessuch ...
Thomas A. Henzinger, Benjamin Horowitz, Rupak Maju...
ICCD
2000
IEEE
119views Hardware» more  ICCD 2000»
14 years 8 days ago
Source-Level Transformations for Improved Formal Verification
A major obstacle to widespread acceptance of formal verification is the difficulty in using the tools effectively. Although learning the basic syntax and operation of a formal ver...
Brian D. Winters, Alan J. Hu
JAVA
2000
Springer
14 years 8 days ago
Development routes for message passing parallelism in Java
Java is an attractive environment for writing portable message passing parallel programs. Considerable work in message passing interface bindings for the C and Fortran languages h...
J. A. Mathew, Heath A. James, Kenneth A. Hawick
NGC
2000
Springer
14 years 7 days ago
The use of hop-limits to provide survivable ATM group communications
We examine the use of a hop-limit constraint with techniques to provide survivability for connection-oriented ATM group communications. A hop-limit constraint is an approach that ...
William Yurcik, David Tipper, Deep Medhi
« Prev « First page 5718 / 5793 Last » Next »