Sciweavers

5344 search results - page 1014 / 1069
» Privacy-Preserving Set Operations
Sort
View
FOCS
2004
IEEE
14 years 1 months ago
On the Streaming Model Augmented with a Sorting Primitive
The need to deal with massive data sets in many practical applications has led to a growing interest in computational models appropriate for large inputs. The most important quali...
Gagan Aggarwal, Mayur Datar, Sridhar Rajagopalan, ...
ECCV
2006
Springer
14 years 1 months ago
Accurate Measurement of Cartilage Morphology Using a 3D Laser Scanner
We describe a method to accurately assess articular cartilage morphology using the three-dimensional laser scanning technology. Traditional methods to obtain ground truth for valid...
Nhon H. Trinh, Jonathan Lester, Braden C. Fleming,...
EMSOFT
2006
Springer
14 years 1 months ago
Incremental schedulability analysis of hierarchical real-time components
Embedded systems are complex as a whole but consist of smaller independent modules minimally interacting with each other. This structure makes embedded systems amenable to composi...
Arvind Easwaran, Insik Shin, Oleg Sokolsky, Insup ...
FASE
2006
Springer
14 years 1 months ago
Trace-Based Memory Aliasing Across Program Versions
One of the major costs of software development is associated with testing and validation of successive versions of software systems. An important problem encountered in testing and...
Murali Krishna Ramanathan, Suresh Jagannathan, Ana...
GECCO
2006
Springer
159views Optimization» more  GECCO 2006»
14 years 1 months ago
Multi-step environment learning classifier systems applied to hyper-heuristics
Heuristic Algorithms (HA) are very widely used to tackle practical problems in operations research. They are simple, easy to understand and inspire confidence. Many of these HAs a...
Javier G. Marín-Blázquez, Sonia Schu...
« Prev « First page 1014 / 1069 Last » Next »