Sciweavers

180 search results - page 11 / 36
» How to safely close a discussion
Sort
View

Lecture Notes
443views
15 years 5 months ago
Design and Analysis of Computer Algorithms
"This course will consist of a number of major sections. The first will be a short review of some preliminary material, including asymptotics, summations, and recurrences and ...
David M. Mount
DASFAA
2007
IEEE
234views Database» more  DASFAA 2007»
14 years 2 months ago
Estimating Missing Data in Data Streams
Networks of thousands of sensors present a feasible and economic solution to some of our most challenging problems, such as real-time traffic modeling, military sensing and trackin...
Nan Jiang, Le Gruenwald
ITCC
2005
IEEE
14 years 1 months ago
Conversion and Proxy Functions for Symmetric Key Ciphers
As a general design criterion, a symmetric key cipher should not be closed under functional composition due to the implications on the security of the cipher. However, there are s...
Debra L. Cook, Angelos D. Keromytis
VISUALIZATION
2005
IEEE
14 years 1 months ago
Visualization of the Genus of Knots
The genus of a knot or link can be defined via Seifert surfaces. A Seifert surface of a knot or link is an oriented surface whose boundary coincides with that knot or link. Schem...
Jarke J. van Wijk, Arjeh M. Cohen
ICIP
2002
IEEE
14 years 9 months ago
Optimal face reconstruction using training
In previous work [2] we considered the problem of image interpolation from an adaptive optimal recovery point of view. We showed how a training set S determines a quadratic signal...
D. Darian Muresan, Thomas W. Parks