资讯

Carnegie Mellon’s School of Computer Science is widely recognized as one of the first and best computer science programs in the world. Our programs train the next generation of innovators to solve ...
Professor Theory Group, Department of Computer Science, Carnegie Mellon University Research interests : algorithms, data streams, machine learning, numerical linear algebra, sketching, and sparse ...
Introduction to Mechanisms Yi Zhang with Susan Finger Stephannie Behrens Table of Contents 1. Linkage mechanisms 1.1 Four bar linkages Linkage are composed of links and lower pairs. The simplest ...
The POSIX thread libraries are a standards based thread API for C/C++. It allows one to spawn a new concurrent process flow. It is most effective on multi-processor or multi-core systems where the ...
This webpage is a benchmark data set for keystroke dynamics. It is a supplement to the paper "Comparing Anomaly-Detection Algorithms for Keystroke Dynamics," by Kevin Killourhy and Roy Maxion, ...
The following papers include theoretical treatments of Delaunay refinement and discussions of the implementation details of my two-dimensional mesh generator and Delaunay triangulator, Triangle, and ...
Reed-Solomon algebraic decoding procedures can correct errors and erasures. An erasure occurs when the position of an erred symbol is known. A decoder can correct up to t errors or up to 2t erasures.
We introduce a stochastic graph-based method for computing relative importance of textual units for Natural Language Processing. We test the technique on the problem of Text Summarization (TS).
In part, the totalitarian state is sustained because individuals terrorize themselves -- they become accomplices in their own tyrranization, censoring what they say and even what they allow themselves ...
Ryan O'Donnell Professor Theory Group, Computer Science Dept., CMU 7213 Gates Hillman Center Administrative Assistant: Emi Perdan Analysis of Boolean Functions book Free PDF download Buy a copy from ...
RIP "finger": the Unix command "finger" shows if a user is logged in, or else displays their "plan" file, with contact info. It used to be connected to the web, but that turns out to be dangerous.
"We look at people like Jack Pidgeon or the public school teacher who stretched the envelope for 30 years as exceptions, as anachronisms, because only the toughest can make a life of it. And that's ...