Sciweavers

1845 search results - page 258 / 369
» Computing the Angularity Tolerance
Sort
View
JSW
2006
98views more  JSW 2006»
13 years 10 months ago
A Jxta Based Asynchronous Peer-to-Peer Implementation of Genetic Programming
Abstract-- Solving complex real-world problems using evolutionary computation is a CPU time-consuming task that requires a large amount of computational resources. Peerto-Peer (P2P...
Gianluigi Folino, Agostino Forestiero, Giandomenic...
TCAD
2002
107views more  TCAD 2002»
13 years 9 months ago
Value-sensitive automatic code specialization for embedded software
The objective of this work is to create a framework for the optimization of embedded software. We present algorithms and a tool flow to reduce the computational effort of programs,...
Eui-Young Chung, Luca Benini, Giovanni De Micheli,...
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
13 years 7 months ago
A DAA Scheme Requiring Less TPM Resources
Abstract. Direct anonymous attestation (DAA) is a special digital signature primitive, which provides a balance between signer authentication and privacy. One of the most interesti...
Liqun Chen
HCI
2009
13 years 7 months ago
A Similarity Measure for Vision-Based Sign Recognition
When we encounter an English word that we do not understand, we can look it up in a dictionary. However, when an American Sign Language (ASL) user encounters an unknown sign, looki...
Haijing Wang, Alexandra Stefan, Vassilis Athitsos
CIARP
2010
Springer
13 years 5 months ago
Comparison of Shape Descriptors for Mice Behavior Recognition
Shape representation provides fundamental features for many applications in computer vision and it is known to be important cues for human vision. This paper presents an experiment...
Jonathan de Andrade Silva, Wesley Nunes Gonç...