Sciweavers

79 search results - page 13 / 16
» Exploiting N-Gram Analysis to Predict Operator Sequences
Sort
View
ICMCS
2005
IEEE
110views Multimedia» more  ICMCS 2005»
14 years 9 days ago
Electronic Chronicles: Empowering Individuals, Groups, and Organizations
Continuing strides in processing, storage, sensing, and networking technologies are enabling people to capture their activities and experiences as greater volumes of ever-richer m...
Gopal Pingali, R. Jain
WSCG
2003
310views more  WSCG 2003»
13 years 8 months ago
Effective Shadow Detection in Traffic Monitoring Applications
This paper presents work we have done in detecting moving shadows in the context of an outdoor traffic scene for visual surveillance purposes. The algorithm just exploits some for...
Alessandro Bevilacqua
BMCBI
2010
100views more  BMCBI 2010»
13 years 6 months ago
Scaffold filling, contig fusion and comparative gene order inference
Background: There has been a trend in increasing the phylogenetic scope of genome sequencing without finishing the sequence of the genome. Increasing numbers of genomes are being ...
Adriana Muñoz, Chunfang Zheng, Qian Zhu, Vi...
ANCS
2005
ACM
14 years 8 days ago
Segmented hash: an efficient hash table implementation for high performance networking subsystems
Hash tables provide efficient table implementations, achieving O(1), query, insert and delete operations at low loads. However, at moderate or high loads collisions are quite freq...
Sailesh Kumar, Patrick Crowley
ISCA
2003
IEEE
169views Hardware» more  ISCA 2003»
13 years 12 months ago
Virtual Simple Architecture (VISA): Exceeding the Complexity Limit in Safe Real-Time Systems
Meeting deadlines is a key requirement in safe realtime systems. Worst-case execution times (WCET) of tasks are needed for safe planning. Contemporary worst-case timing analysis t...
Aravindh Anantaraman, Kiran Seth, Kaustubh Patil, ...