Sciweavers

1659 search results - page 79 / 332
» From Functional Analysis to Iterative Methods
Sort
View
FMCAD
2008
Springer
13 years 11 months ago
Going with the Flow: Parameterized Verification Using Message Flows
A message flow is a sequence of messages sent among processors during the execution of a protocol, usually illustrated with something like a message sequence chart. Protocol design...
Murali Talupur, Mark R. Tuttle
ICPR
2000
IEEE
14 years 11 months ago
Cooperation between Level Set Techniques and Dense 3D Registration for the Segmentation of Brain Structures
This paper presents a cooperative strategy between volumetric registration and segmentation. The segmentation method is based on the level set formalism. Starting from an initial ...
C. Baillard, Pierre Hellier, Christian Barillot
ECML
2007
Springer
14 years 4 months ago
Scale-Space Based Weak Regressors for Boosting
Boosting is a simple yet powerful modeling technique that is used in many machine learning and data mining related applications. In this paper, we propose a novel scale-space based...
Jin Hyeong Park, Chandan K. Reddy
CORR
2010
Springer
76views Education» more  CORR 2010»
13 years 5 months ago
Power Control with Imperfect Exchanges and Applications to Spectrum Sharing
In various applications, the effect of errors in gradient-based iterations is of particular importance when seeking saddle points of the Lagrangian function associated with constra...
Nikolaos Gatsis, Georgios B. Giannakis
MSR
2005
ACM
14 years 3 months ago
Recovering system specific rules from software repositories
One of the most successful applications of static analysis based bug finding tools is to search the source code for violations of system-specific rules. These rules may describe h...
Chadd C. Williams, Jeffrey K. Hollingsworth