Sciweavers

349 search results - page 14 / 70
» Symmetrically exploiting XML
Sort
View
ADCM
1998
133views more  ADCM 1998»
13 years 9 months ago
Numerical exploitation of symmetry in integral equations
: Linear integral operators describing physical problems on symmetric domains often are equivariant, which means that they commute with certain symmetries, i.e., with a group of or...
Eugene L. Allgower, Kurt Georg
SGAI
2004
Springer
14 years 3 months ago
Exploiting Causal Independence in Large Bayesian Networks
The assessment of a probability distribution associated with a Bayesian network is a challenging task, even if its topology is sparse. Special probability distributions based on t...
Rasa Jurgelenaite, Peter J. F. Lucas
CVPR
2012
IEEE
12 years 11 days ago
Discovering and exploiting 3D symmetries in structure from motion
Many architectural scenes contain symmetric or repeated structures, which can generate erroneous image correspondences during structure from motion (Sfm) computation. Prior work h...
Andrea Cohen, Christopher Zach, Sudipta N. Sinha, ...
IS
2008
13 years 10 months ago
Efficient memory representation of XML document trees
Implementations that load XML documents and give access to them via, e.g., the DOM, suffer from huge memory demands: the space needed to load an XML document is usually many times...
Giorgio Busatto, Markus Lohrey, Sebastian Maneth
JCP
2008
119views more  JCP 2008»
13 years 10 months ago
Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware
With the wireless communications coming to homes and offices, the need to have secure data transmission is of utmost importance. Today, it is important that information is sent con...
Omar S. Elkeelany, Adegoke Olabisi