"I could write a spelling corrector that achieves 80 or 90% accuracy at a rate of at least 10 words per second." and did, a guide on how it works is included also.
Interview with Sebastian DeGuy. We discuss how small the textures can actual get, whether procedural textures can compare with textures in games like Crysis and much more
a collection of machine learning algorithms for data mining tasks. The algorithms can either be applied directly to a dataset or called from your own Java code.
by Bill Green. using the Sobel and the Laplace methods."Edges characterize boundaries and are therefore a problem of fundamental importance in image processing"
a digital signal processing (DSP) technique for identifying frequency components of a signal, published by Dr. Gerald Goertzel in 1958. While the general Fast Fourier transform (FFT) algorithm computes evenly across the bandwidth of the incoming signal, the Goertzel algorithm looks at specific, predetermined frequency.
a series of learning activities that reveals a little-known secret: computer science isn't really about computers at all. Unplugged teaches principles of computer science through games and puzzles.
By Oleg Krivtsov - Implementing Lucas-Kanade and Baker-Dellaert-Matthews image alignment algorithms (remember to check l8r freaking site changes the urls)
in admob's case (e.g. a profit-maximization problem), the cost matrix prob should be modified so that minimization of the matrix elements results in maximizing the original cost values
a library of simple functions that are optimized for various CPUs. These functions are generally loops implementing simple algorithms, such as converting an array of N integers to floating-point numbers...
a compilation of Michael's writings on assembly language and graphics programming (including Dr. Dobb's Journal "Graphics Programming" column).Focus is on profiling and code testing, as well as performance optimization.
a free (under GNU Lesser GPL) library which provides a uniform interface to a large number of hash algorithms. These algorithms can be used to compute checksums, message digests, and other signatures.
The numbers that control your life. You're identified by dozens of numbers. Your phone number, your driver's license number, your social security number, your zip code, your license plate, your credit card numbers. I find these numbers fascinating. Who distributes them? What can they be used for? How can you use them? How are they issued?
a software framework that allows for advanced sequence and protocol stream analysis by utilizing bioinformatics algorithms. The sole purpose of this software is to identify protocol fields in unknown or poorly documented network protocol formats.
D. Adjiashvili, A. Baggio, and R. Zenklusen. Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, page 2364--2383. Philadelphia, PA, USA, Society for Industrial and Applied Mathematics, (2017)
R. Agrawal, and R. Srikant. Proceedings of the 20th international conference on Very Large Data Bases (VLDB'94), page 478--499. Morgan Kaufmann, (September 1994)
J. Aguilar, J. Riquelme, and M. Toro. Proceedings of the Genetic and Evolutionary
Computation Conference, 1, page 771. Orlando, Florida, USA, Morgan Kaufmann, (13-17 July 1999)
J. Aguilar, and P. Miranda. Proceedings of the Genetic and Evolutionary
Computation Conference, 1, page 3--10. Orlando, Florida, USA, Morgan Kaufmann, (13-17 July 1999)
H. Aguirre, K. Tanaka, and T. Sugimura. Proceedings of the Genetic and Evolutionary
Computation Conference, 1, page 772. Orlando, Florida, USA, Morgan Kaufmann, (13-17 July 1999)