Sciweavers

429 search results - page 39 / 86
» Permutative Additives and Exponentials
Sort
View
ICASSP
2008
IEEE
14 years 2 months ago
Symbol graph based discriminative training and rescoring for improved math symbol recognition
In the symbol recognition stage of online handwritten math expression recognition, the one-pass dynamic programming algorithm can produce high-quality symbol graphs in addition of...
Zhen Xuan Luo, Yu Shi, Frank K. Soong
RTSS
2008
IEEE
14 years 2 months ago
Priority Assignment for Real-Time Wormhole Communication in On-Chip Networks
—Wormhole switching with fixed priority preemption has been proposed as a possible solution for real-time on-chip communication. However, none of current priority assignment pol...
Zheng Shi, Alan Burns
ICRA
2007
IEEE
161views Robotics» more  ICRA 2007»
14 years 2 months ago
Manipulation Planning Among Movable Obstacles
— This paper presents the ResolveSpatialConstraints (RSC) algorithm for manipulation planning in a domain with movable obstacles. Empirically we show that our algorithm quickly g...
Mike Stilman, Jan-Ullrich Schamburek, James Kuffne...
CSL
2007
Springer
14 years 1 months ago
Propositional Logic for Circuit Classes
Abstract. By introducing a parallel extension rule that is aware of independence of the introduced extension variables, a calculus for quantified propositional logic is obtained w...
Klaus Aehlig, Arnold Beckmann
DEXA
2007
Springer
141views Database» more  DEXA 2007»
14 years 1 months ago
Indexing Set-Valued Attributes with a Multi-level Extendible Hashing Scheme
We present an access method for set-valued attributes that is based on a multi-level extendible hashing scheme. This scheme avoids exponential directory growth for skewed data and...
Sven Helmer, Robin Aly, Thomas Neumann, Guido Moer...