Sciweavers

1054 search results - page 181 / 211
» Guarded Expressions in Practice
Sort
View
JSAC
2010
142views more  JSAC 2010»
13 years 9 months ago
Extreme value FEC for reliable broadcasting in wireless networks
—The advent of practical rateless codes enables implementation of highly efficient packet-level forward error correction (FEC) strategies for reliable data broadcasting in loss-...
Weiyao Xiao, David Starobinski
POPL
2012
ACM
12 years 6 months ago
A type system for borrowing permissions
In object-oriented programming, unique permissions to object references are useful for checking correctness properties such as consistency of typestate and noninterference of conc...
Karl Naden, Robert Bocchino, Jonathan Aldrich, Kev...
ECCV
2004
Springer
15 years 25 days ago
A Closed-Form Solution to Non-rigid Shape and Motion Recovery
Recovery of three dimensional (3D) shape and motion of non-static scenes from a monocular video sequence is important for applications like robot navigation and human computer inte...
Jing Xiao, Jinxiang Chai, Takeo Kanade
ICDE
2000
IEEE
120views Database» more  ICDE 2000»
15 years 9 days ago
Deflating the Dimensionality Curse Using Multiple Fractal Dimensions
Nearest neighbor queries are important in many settings, including spatial databases (Find the k closest cities) and multimedia databases (Find the k most similar images). Previou...
Bernd-Uwe Pagel, Flip Korn, Christos Faloutsos
ICDE
1998
IEEE
108views Database» more  ICDE 1998»
15 years 9 days ago
Efficient Discovery of Functional and Approximate Dependencies Using Partitions
Discovery of functionaldependencies from relations has been identified as an important database analysis technique. In this paper, we present a new approach for finding functional...
Ykä Huhtala, Juha Kärkkäinen, Pasi ...