Sciweavers

199 search results - page 6 / 40
» Higher-Order Critical Pairs
Sort
View
GMP
2006
IEEE
161views Solid Modeling» more  GMP 2006»
14 years 1 months ago
Tracking Point-Curve Critical Distances
This paper presents a novel approach to continuously and robustly tracking critical (geometrically, perpendicular and/or extremal) distances from a moving plane point p ∈ R2 to a...
Xianming Chen, Elaine Cohen, Richard F. Riesenfeld
NAACL
2010
13 years 5 months ago
Making Conversational Structure Explicit: Identification of Initiation-response Pairs within Online Discussions
In this paper we investigate how to identify initiation-response pairs in asynchronous, multi-threaded, multi-party conversations. We formulate the task of identifying initiation-...
Yi-Chia Wang, Carolyn Penstein Rosé
ISCC
2009
IEEE
158views Communications» more  ISCC 2009»
14 years 2 months ago
Connectivity and critical point behavior in mobile ad hoc and sensor networks
— A well-known approach to increase the resilience of mobile ad hoc networks (MANETs) and unstructured sensor networks is to ensure a network topology where there are at least k ...
Tae-Hoon Kim, David Tipper, Prashant Krishnamurthy
ECCV
2002
Springer
14 years 9 months ago
Understanding and Modeling the Evolution of Critical Points under Gaussian Blurring
Abstract. In order to investigate the deep structure of Gaussian scale space images, one needs to understand the behaviour of critical points under the influence of parameter-drive...
Arjan Kuijper, Luc Florack
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
14 years 1 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...