Sciweavers

2016 search results - page 338 / 404
» Megamaps: Construction and Examples
Sort
View
ICIP
2008
IEEE
14 years 4 months ago
On the security of non-forgeable robust hash functions
In many applications, it is often desirable to extract a consistent key from a multimedia object (e.g., an image), even when the object has gone through a noisy channel. For examp...
Qiming Li, Sujoy Roy
IJCNN
2008
IEEE
14 years 4 months ago
Active Meta-Learning with Uncertainty Sampling and Outlier Detection
Abstract— Meta-Learning has been used to predict the performance of learning algorithms based on descriptive features of the learning problems. Each training example in this cont...
Ricardo Bastos Cavalcante Prudêncio, Teresa ...
IPPS
2008
IEEE
14 years 4 months ago
A deterministic multi-way rendezvous library for haskell
The advent of multicore processors requires mainstream concurrent programming languages with high level concurrency constructs and effective debugging techniques. Unfortunately, m...
Nalini Vasudevan, Satnam Singh, Stephen A. Edwards
SASO
2008
IEEE
14 years 4 months ago
Bioinspired Environmental Coordination in Spatial Computing Systems
—Spatial computing systems are characterized by the extended physical environment in which they exist and function. Often this environment can be manipulated in various ways by t...
Justin Werfel, Yaneer Bar-Yam, Donald E. Ingber
SEFM
2008
IEEE
14 years 4 months ago
Specialized Aspect Languages Preserving Classes of Properties
Aspect oriented programming can arbitrarily distort the semantics of programs. In particular, weaving can invalidate crucial safety and liveness properties of the base program. In...
Simplice Djoko Djoko, Rémi Douence, Pascal ...