Sciweavers

JCST
2010
189views more  JCST 2010»
13 years 6 months ago
Formally Analyzing Expected Time Complexity of Algorithms Using Theorem Proving
Probabilistic techniques are widely used in the analysis of algorithms to estimate the computational complexity of algorithms or a computational problem. Traditionally, such analys...
Osman Hasan, Sofiène Tahar
JCST
2010
109views more  JCST 2010»
13 years 6 months ago
Feature Preserving Mesh Simplification Using Feature Sensitive Metric
We present a new method for feature preserving mesh simplification based on feature sensitive (FS) metric. Previous quadric error based approach is extended to a high-dimensional F...
Jin Wei, Yu Lou
JCST
2010
109views more  JCST 2010»
13 years 6 months ago
The Inverse Classification Problem
In this paper, we examine an emerging variation of the classification problem, which is known as the inverse classification problem. In this problem, we determine the features to b...
Charu C. Aggarwal, Chen Chen, Jiawei Han
JCST
2010
155views more  JCST 2010»
13 years 6 months ago
Efficient Location Updates for Continuous Queries over Moving Objects
Abstract The significant overhead related to frequent location updates from moving objects often results in poor performance. As most of the location updates do not affect the quer...
Yu-Ling Hsueh, Roger Zimmermann, Wei-Shinn Ku
JCST
2010
153views more  JCST 2010»
13 years 6 months ago
Model Failure and Context Switching Using Logic-Based Stochastic Models
Abstract We define a notion of context that represents invariant, stable-over-time behavior in an environment and we propose an algorithm for detecting context changes in a stream ...
Nikita A. Sakhanenko, George F. Luger
JCST
2010
198views more  JCST 2010»
13 years 6 months ago
Certification of Thread Context Switching
With recent efforts to build foundational certified software systems, two different approaches have been proposed to certify thread context switching. One is to certify both thread...
Yu Guo, Xinyu Jiang, Yiyun Chen
JCST
2010
128views more  JCST 2010»
13 years 6 months ago
Queue Waiting Time Aware Dynamic Workflow Scheduling in Multicluster Environments
Abstract Workflows are prevailing in scientific computation. Multicluster environments emerge and provide more resources, benefiting workflows but also challenging the traditional ...
Zhi-Feng Yu, Wei-Song Shi
JCST
2010
147views more  JCST 2010»
13 years 6 months ago
A Multi-Key Pirate Decoder Against Traitor Tracing Schemes
In this paper we introduce an architecture for a multi-key pirate decoder which employs decryption keys from multiple traitors. The decoder has built-in monitoring and self protect...
Yongdong Wu, Robert H. Deng
JCST
2010
147views more  JCST 2010»
13 years 10 months ago
Volumetric Vector-Based Representation for Indirect Illumination Caching
Abstract This paper introduces a caching technique based on a volumetric representation that captures low-frequency indirect illumination. This structure is intended for efficient ...
Romain Pacanowski, Xavier Granier, Christophe Schl...
JCST
2010
122views more  JCST 2010»
13 years 10 months ago
Harmonic Field Based Volume Model Construction from Triangle Soup
Surface triangle meshes and volume data are two commonly used representations of digital geometry. Converting from triangle meshes to volume data is challenging, since triangle mes...
Chao-Hui Shen, Guo-Xin Zhang, Yu-Kun Lai, Shi-Min ...