Sciweavers

1920 search results - page 106 / 384
» The Range Constraint: Algorithms and Implementation
Sort
View
140
Voted
RSP
2003
IEEE
130views Control Systems» more  RSP 2003»
15 years 9 months ago
Contributions to middleware architectures to prototype distribution infrastructures
— Distributed applications require specific middleware support for semantics and run-time constraints for a wide range of hardware or software configurations. However, their fu...
Jérôme Hugues, Laurent Pautet, Fabric...
COMPGEOM
1998
ACM
15 years 8 months ago
Rotational Polygon Containment and Minimum Enclosure
An algorithm and a robust floating point implementation is given for rotational polygon containment: given polygons P1,P2,P3,...,Pk and a container polygon C, find rotations and...
Victor Milenkovic
CIKM
2011
Springer
14 years 3 months ago
Lower-bounding term frequency normalization
In this paper, we reveal a common deficiency of the current retrieval models: the component of term frequency (TF) normalization by document length is not lower-bounded properly;...
Yuanhua Lv, ChengXiang Zhai
123
Voted
CVPR
2009
IEEE
15 years 10 months ago
A 3D reconstruction pipeline for digital preservation
—We present a new 3D reconstruction pipeline for digital preservation of natural and cultural assets. This application requires high quality results, making time and space constr...
Alexandre Vrubel, Olga Regina Pereira Bellon, Luci...
FORTE
1997
15 years 5 months ago
On-Line Timed Protocol Trace Analysis Based on Uncertain State Descriptions
This paper presents a new approach to the task of passive protocol tracing. The method called FollowSM for the first time meets all requirements of practical in-field use, inclu...
Marek Musial