资讯
Abstract Photo-editing software restricts the control of objects in a photograph to the 2D image plane. We present a method that enables users to perform the full range of 3D manipulations, including ...
Carnegie Mellon’s School of Computer Science is widely recognized as one of the first and best computer science programs in the world. Our programs train the next generation of innovators to solve ...
Professor Theory Group, Department of Computer Science, Carnegie Mellon University Research interests : algorithms, data streams, machine learning, numerical linear algebra, sketching, and sparse ...
Introduction to Mechanisms Yi Zhang with Susan Finger Stephannie Behrens Table of Contents 1. Linkage mechanisms 1.1 Four bar linkages Linkage are composed of links and lower pairs. The simplest ...
The POSIX thread libraries are a standards based thread API for C/C++. It allows one to spawn a new concurrent process flow. It is most effective on multi-processor or multi-core systems where the ...
This webpage is a benchmark data set for keystroke dynamics. It is a supplement to the paper "Comparing Anomaly-Detection Algorithms for Keystroke Dynamics," by Kevin Killourhy and Roy Maxion, ...
Reed-Solomon algebraic decoding procedures can correct errors and erasures. An erasure occurs when the position of an erred symbol is known. A decoder can correct up to t errors or up to 2t erasures.
The following papers include theoretical treatments of Delaunay refinement and discussions of the implementation details of my two-dimensional mesh generator and Delaunay triangulator, Triangle, and ...
We introduce a stochastic graph-based method for computing relative importance of textual units for Natural Language Processing. We test the technique on the problem of Text Summarization (TS).
In part, the totalitarian state is sustained because individuals terrorize themselves -- they become accomplices in their own tyrranization, censoring what they say and even what they allow themselves ...
Ryan O'Donnell Professor Theory Group, Computer Science Dept., CMU 7213 Gates Hillman Center Administrative Assistant: Emi Perdan Analysis of Boolean Functions book Free PDF download Buy a copy from ...
RIP "finger": the Unix command "finger" shows if a user is logged in, or else displays their "plan" file, with contact info. It used to be connected to the web, but that turns out to be dangerous.
当前正在显示可能无法访问的结果。
隐藏无法访问的结果