Sciweavers

4870 search results - page 810 / 974
» Construction of Wavelets and Applications
Sort
View
JPDC
2010
65views more  JPDC 2010»
15 years 3 months ago
Combining shared-coin algorithms
This paper shows that shared coin algorithms can be combined to optimize several complexity measures, even in the presence of a strong adversary. By combining shared coins of Brac...
James Aspnes, Hagit Attiya, Keren Censor
JUCS
2010
98views more  JUCS 2010»
15 years 3 months ago
Mobile Agent-based Context-aware Services
: This paper presents an agent-based system for building and operating agent-based context-aware services in public spaces, including museums. The system provides users with agents...
Ichiro Satoh
MA
2010
Springer
140views Communications» more  MA 2010»
15 years 3 months ago
On the limiting spectral distribution of the covariance matrices of time-lagged processes
We consider two continuous-time Gaussian processes, one being partially correlated to a time-lagged version of the other. We first give the limiting spectral distribution for the ...
Christian Y. Robert, Mathieu Rosenbaum
131
Voted
OOPSLA
2010
Springer
15 years 3 months ago
Language virtualization for heterogeneous parallel computing
As heterogeneous parallel systems become dominant, application developers are being forced to turn to an incompatible mix of low level programming models (e.g. OpenMP, MPI, CUDA, ...
Hassan Chafi, Zach DeVito, Adriaan Moors, Tiark Ro...
PR
2010
220views more  PR 2010»
15 years 3 months ago
Online finger-knuckle-print verification for personal authentication
Biometric based personal authentication is an effective method for automatically recognizing, with a high confidence, a person’s identity. By observing that the texture pattern p...
Lin Zhang, Lei Zhang 0006, David Zhang, Hailong Zh...