Sciweavers

CORR
2011
Springer
157views Education» more  CORR 2011»
13 years 3 months ago
Fast and Faster: A Comparison of Two Streamed Matrix Decomposition Algorithms
With the explosion of the size of digital dataset, the limiting factor for decomposition algorithms is the number of passes over the input, as the input is often stored out-of-cor...
Radim Rehurek
CORR
2011
Springer
179views Education» more  CORR 2011»
13 years 3 months ago
An overview of Ciao and its design philosophy
We provide an overall description of the Ciao multiparadigm programming system emphasizing some of the novel aspects and motivations behind its design and implementation. An impor...
Manuel V. Hermenegildo, Francisco Bueno, Manuel Ca...
CORR
2011
Springer
146views Education» more  CORR 2011»
13 years 3 months ago
An Implicit Cover Problem in Wild Population Study
In an implicit combinatorial optimization problem, the constraints are not enumerated explicitly but rather stated implicitly through equations, other constraints or auxiliary alg...
Mary V. Ashley, Tanya Y. Berger-Wolf, Wanpracha Ar...
CORR
2011
Springer
171views Education» more  CORR 2011»
13 years 3 months ago
Complete Subdivision Algorithms, II: Isotopic Meshing of Singular Algebraic Curves
Michael Burr, Sung Woo Choi, Benjamin Galehouse, C...
CORR
2011
Springer
169views Education» more  CORR 2011»
13 years 3 months ago
Continuous Multiclass Labeling Approaches and Algorithms
Jan Lellmann, Christoph Schnörr
CORR
2011
Springer
149views Education» more  CORR 2011»
13 years 3 months ago
Tight Bounds for Parallel Randomized Load Balancing
Christoph Lenzen, Roger Wattenhofer
CORR
2011
Springer
158views Education» more  CORR 2011»
13 years 3 months ago
SqFreeEVAL: An (almost) optimal real-root isolation algorithm
Let f be a univariate polynomial with real coefficients, f ∈ R[X]. Subdivision algorithms based on algebraic techniques (e.g., Sturm or Descartes methods) are widely used for is...
Michael Burr, Felix Krahmer
CORR
2011
Springer
195views Education» more  CORR 2011»
13 years 3 months ago
Context-aware Authorization in Highly Dynamic Environments
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require frequent adaptation of applications. Context is a key to adapt suiting user ne...
Jean-Yves Tigli, Stephane Lavirotte, Gaëtan R...
CORR
2011
Springer
181views Education» more  CORR 2011»
13 years 3 months ago
Lightweight Service Oriented Architecture for Pervasive Computing
Pervasive computing appears like a new computing era based on networks of objects and devices evolving in a real world, radically different from distributed computing, based on ne...
Jean-Yves Tigli, Stephane Lavirotte, Gaëtan R...