Sciweavers

2125 search results - page 213 / 425
» Points with Type-2 Operations
Sort
View
IJCV
2008
155views more  IJCV 2008»
15 years 4 months ago
Fast Transformation-Invariant Component Analysis
For software and more illustrations: http://www.psi.utoronto.ca/anitha/fastTCA.htm Dimensionality reduction techniques such as principal component analysis and factor analysis are...
Anitha Kannan, Nebojsa Jojic, Brendan J. Frey
140
Voted
GRID
2006
Springer
15 years 4 months ago
Implementation of Fault-Tolerant GridRPC Applications
In this paper, a task parallel application is implemented with Ninf-G which is a GridRPC system, and experimented on, using the Grid testbed in Asia Pacific, for three months. The...
Yusuke Tanimura, Tsutomu Ikegami, Hidemoto Nakada,...
147
Voted
CORR
2007
Springer
81views Education» more  CORR 2007»
15 years 4 months ago
Throughput Scaling Laws for Wireless Networks with Fading Channels
—A network of n communication links, operating over a shared wireless channel, is considered. Fading is assumed to be the dominant factor affecting the strength of the channels b...
Masoud Ebrahimi, Mohammad Ali Maddah-Ali, Amir K. ...
ITSSA
2006
67views more  ITSSA 2006»
15 years 4 months ago
Metamodel Access Protocols for Extensible Aspect-Oriented Modeling
Aspect orientation is important not only at the programming-level but also at the modeling-level. We previously proposed an aspect-oriented modeling language called AspectM for ma...
Naoyasu Ubayashi, Tetsuo Tamai, Shinji Sano, Yusak...
DI
2007
81views more  DI 2007»
15 years 4 months ago
Using every part of the buffalo in Windows memory analysis
All Windows memory analysis techniques depend on the examiner’s ability to translate the virtual addresses used by programs and operating system components into the true locatio...
Jesse D. Kornblum