Sciweavers

2316 search results - page 147 / 464
» The many forms of hypercomputation
Sort
View
ICONIP
1998
15 years 6 months ago
An Application of ELISA to Perfect Hashing with Deterministic Ordering
This paper describes a practical application of a novel terminal attractor algorithm to the construction of Perfect Hash Functions (PHF) for a prede ned set of keys. The proposed ...
Monica Bianchini, Stefano Fanelli, Marco Gori
MVA
1998
158views Computer Vision» more  MVA 1998»
15 years 6 months ago
Detection of Curvilinear Structures Using the Euclidean Distance Transform
In this paper, we present a new method for detecting curvilinear structures in a gray-scale image. The concept of skeleton extraction is introduced to detect more general structur...
Jeong-Hun Jang, Ki-Sang Hong
IJCAI
1997
15 years 6 months ago
Probabilistic Partial Evaluation: Exploiting Rule Structure in Probabilistic Inference
Bayesian belief networks have grown to prominence because they provide compact representations of many domains, and there are algorithms to exploit this compactness. The next step...
David Poole
WSC
1998
15 years 6 months ago
Efficient Process Interaction with Threads in Parallel Discrete Event Simulation
Parallel discrete event simulation (PDES) decreases a simulation's runtime by splitting the simulation's work between multiple processors. Many users avoid PDES because ...
Reuben Passqini, Vernon Rego
IJCAI
1997
15 years 6 months ago
Anytime Belief Revision
Belief Revision is a ubiquitous process underlying many forms of intelligent behaviour. The AGM paradigm is a powerful framework for modeling and implementing belief revision syst...
Mary-Anne Williams