Sciweavers

715 search results - page 122 / 143
» Second step algorithms in the Burrows-Wheeler compression al...
Sort
View
VMV
2007
118views Visualization» more  VMV 2007»
13 years 8 months ago
Interactive Model-based Image Registration
We present an interactive technique for the registration of captured images of elastic and rigid body parts in which the user is given flexible control over material specific de...
Thomas Schiwietz, Joachim Georgii, Rüdiger We...
JCM
2006
124views more  JCM 2006»
13 years 7 months ago
Policy Defined Spectrum sharing and medium Access for Cognitive Radios
Spectrum regulation will undergo elementary changes in the near future allowing a less restricted and more flexible access to radio spectrum. Intelligent radios, socalled cognitive...
Lars Berlemann, Stefan Mangold, Guido R. Hiertz, B...
TCAD
2008
114views more  TCAD 2008»
13 years 7 months ago
Word-Level Predicate-Abstraction and Refinement Techniques for Verifying RTL Verilog
el Predicate Abstraction and Refinement Techniques for Verifying RTL Verilog Himanshu Jain, Daniel Kroening, Natasha Sharygina, and Edmund M. Clarke, Fellow, IEEE As a first step, ...
Himanshu Jain, Daniel Kroening, Natasha Sharygina,...
JACM
2002
87views more  JACM 2002»
13 years 7 months ago
Bounded concurrent timestamp systems using vector clocks
Abstract. Shared registers are basic objects used as communication mediums in asynchronous concurrent computation. A concurrent timestamp system is a higher typed communication obj...
Sibsankar Haldar, Paul M. B. Vitányi
SIGMETRICS
2002
ACM
115views Hardware» more  SIGMETRICS 2002»
13 years 7 months ago
Maximum likelihood network topology identification from edge-based unicast measurements
Network tomography is a process for inferring "internal" link-level delay and loss performance information based on end-to-end (edge) network measurements. These methods...
Mark Coates, Rui Castro, Robert Nowak, Manik Gadhi...