Sciweavers

26354 search results - page 72 / 5271
» How we refactor, and how we know it
Sort
View
ALGORITHMICA
2005
108views more  ALGORITHMICA 2005»
13 years 9 months ago
How Fast Is the k-Means Method?
We present polynomial upper and lower bounds on the number of iterations performed by the k-means method (a.k.a. Lloyd's method) for k-means clustering. Our upper bounds are ...
Sariel Har-Peled, Bardia Sadri
TPDS
2008
76views more  TPDS 2008»
13 years 9 months ago
How to Choose a Timing Model
When employing a consensus algorithm for state machine replication, should one optimize for the case that all communication links are usually timely, or for fewer timely links? Do...
Idit Keidar, Alexander Shraer
BMVC
2010
13 years 4 months ago
"How old are you?" : Age Estimation with Tensors of Binary Gaussian Receptive Maps
In this paper we describe experiments with a method to automatically estimate human age from facial images. This system extends recent results with the use of a tensorial represen...
John A. Ruiz-Hernandez, James L. Crowley, Augustin...
ICASSP
2011
IEEE
13 years 24 days ago
How many known symbols are required for linear channel estimation in OFDM?
Training sequences for estimation of channel parameters have been well designed under the condition that the number of the unknown channel parameters is not greater than the numbe...
Shuichi Ohno, Emmanuel Manasseh, Masayoshi Nakamot...
DSS
2011
13 years 17 days ago
How much to spend on flexibility? Determining the value of information system flexibility
In the current paper, we outline several approaches to determine the value of information system (IS) flexibility, defined as the extent to which an IS can be modified and upgrade...
Franz Schober, Judith Gebauer