Sciweavers

368 search results - page 73 / 74
» Sphere Methods for LP
Sort
View
ESOP
2005
Springer
14 years 19 days ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
GFKL
2005
Springer
167views Data Mining» more  GFKL 2005»
14 years 19 days ago
Quantitative Text Typology: The Impact of Sentence Length
Abstract. This study focuses on the contribution of sentence length for a quantitative text typology. Therefore, 333 Slovenian texts are analyzed with regard to their sentence leng...
Emmerich Kelih, Peter Grzybek, Gordana Antic, Erns...
DAGSTUHL
2010
13 years 8 months ago
CSG Operations of Arbitrary Primitives with Interval Arithmetic and Real-Time Ray Casting
We apply Knoll et al.'s algorithm [9] to interactively ray-cast constructive solid geometry (CSG) objects of arbitrary primitives represented as implicit functions. Whereas m...
Younis Hijazi, Aaron Knoll, Mathias Schott, Andrew...
CASCON
1996
72views Education» more  CASCON 1996»
13 years 8 months ago
A robot agent that can search
Object search is the task of eciently searching for a given 3D object in a given 3D environment by an agent equipped with a camera for target detection and, if the environment con...
Yiming Ye, John K. Tsotsos
TIT
2002
118views more  TIT 2002»
13 years 6 months ago
Cayley differential unitary space - Time codes
One method for communicating with multiple antennas is to encode the transmitted data differentially using unitary matrices at the transmitter, and to decode differentially withou...
Babak Hassibi, Bertrand M. Hochwald