Sciweavers

438 search results - page 41 / 88
» constraints 1998
Sort
View
130
Voted
ECCV
1998
Springer
16 years 5 months ago
A Two-Stage Probabilistic Approach for Object Recognition
Assume that some objects are present in an image but can be seen only partially and are overlapping each other. To recognize the objects, we have to rstly separate the objects from...
Stan Z. Li, Joachim Hornegger
104
Voted
ISCA
1998
IEEE
123views Hardware» more  ISCA 1998»
15 years 8 months ago
Weak Ordering - A New Definition
A memory model for a shared memory, multiprocessor commonly and often implicitly assumed by programmers is that of sequential consistency. This model guarantees that all memory ac...
Sarita V. Adve, Mark D. Hill
128
Voted
ACL
1998
15 years 5 months ago
The Production of Code-Mixed Discourse
We propose a comprehensive theory of codemixed discourse, encompassing equivalencepoint and insertional code-switching, palindromic constructions and lexical borrowing. The starti...
David Sankoff
125
Voted
UAI
1998
15 years 5 months ago
Structured Reachability Analysis for Markov Decision Processes
Recent research in decision theoretic planning has focussedon making the solution of Markov decision processes (MDPs) more feasible. We develop a family of algorithms for structur...
Craig Boutilier, Ronen I. Brafman, Christopher W. ...
156
Voted
TON
1998
186views more  TON 1998»
15 years 3 months ago
Virtual path control for ATM networks with call level quality of service guarantees
— The configuration of virtual path (VP) connection services is expected to play an important role in the operation of large-scale asynchronous transfer mode (ATM) networks. A m...
Nikolaos Anerousis, Aurel A. Lazar