Sciweavers

1566 search results - page 24 / 314
» Contification Using Dominators
Sort
View
RTA
2010
Springer
13 years 10 months ago
Underspecified computation of normal forms
We consider the problem of computing, out of a set C of trees and a rewrite system R, those trees in C that cannot be rewritten into a tree in C. We solve this problem for sets of ...
Alexander Koller, Stefan Thater
CAINE
2001
13 years 10 months ago
Model Reduction Scheme of State-Affine Systems
In this paper, a new method for the approximation of discrete time state-affine systems is proposed. The method is based on the diagonalization of proposed generalized controllabi...
Samir A. Al-Baiyat
ICOIN
2004
Springer
14 years 1 months ago
Performance of New Broadcast Forwarding Criteria in MANET
In a mobile ad hoc network (MANET), packet broadcast is common and frequently used to disseminate information. Broadcast consume large amount of bandwidth resource, which is scarce...
Lijuan Zhu, Bu-Sung Lee, Boon-Chong Seet, Kai Juan...
ACSC
2007
IEEE
14 years 2 months ago
Improved Shortest Path Algorithms For Nearly Acyclic Directed Graphs
This paper presents new algorithms for computing single source shortest paths (SSSPs) in a nearly acyclic directed graph G. The first part introduces higher-order decomposition. ...
Lin Tian, Tadao Takaoka
FGR
2008
IEEE
134views Biometrics» more  FGR 2008»
14 years 2 months ago
Identifying dominant people in meetings from audio-visual sensors
This paper provides an overview of the area of automated dominance estimation in group meetings. We describe research in social psychology and use this to explain the motivations ...
Hayley Hung, Daniel Gatica-Perez