Sciweavers

10602 search results - page 50 / 2121
» Weakly Useful Sequences
Sort
View
EUROSYS
2010
ACM
14 years 2 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
CORR
2010
Springer
61views Education» more  CORR 2010»
13 years 9 months ago
A weakly stable algorithm for general Toeplitz systems
We show that a fast algorithm for the QR factorization of a Toeplitz or Hankel matrix A is weakly stable in the sense that RT R is close to AT A. Thus, when the algorithm is used ...
Adam W. Bojanczyk, Richard P. Brent, Frank R. de H...
WADS
2007
Springer
96views Algorithms» more  WADS 2007»
14 years 3 months ago
Initializing Sensor Networks of Non-uniform Density in the Weak Sensor Model
Abstract. Assumptions about node density in the Sensor Networks literature are frequently too strong or too weak. Neither absolutely arbitrary nor uniform deployment seem feasible ...
Martin Farach-Colton, Miguel A. Mosteiro
IJCV
2007
196views more  IJCV 2007»
13 years 9 months ago
Weakly Supervised Scale-Invariant Learning of Models for Visual Recognition
We investigate a method for learning object categories in a weakly supervised manner. Given a set of images known to contain the target category from a similar viewpoint, learning...
Robert Fergus, Pietro Perona, Andrew Zisserman
APAL
2004
105views more  APAL 2004»
13 years 9 months ago
Dual weak pigeonhole principle, Boolean complexity, and derandomization
We study the extension (introduced as BT in [5]) of the theory S1 2 by instances of the dual (onto) weak pigeonhole principle for p-time functions, dWPHP(PV )x x2 . We propose a n...
Emil Jerábek