Sciweavers

1642 search results - page 305 / 329
» A Heuristic Method for Business Process Model Evaluation
Sort
View
ICC
2009
IEEE
120views Communications» more  ICC 2009»
15 years 11 months ago
Back-of-the-Envelope Computation of Throughput Distributions in CSMA Wireless Networks
— This paper presents a simple method for computing throughputs of links in a CSMA network. We call our method back-of-the-envelop (BoE) computation, because for many network con...
Soung Chang Liew, Caihong Kai, Jason Leung, Bill W...
ICCAD
1997
IEEE
137views Hardware» more  ICCAD 1997»
15 years 8 months ago
Optimization techniques for high-performance digital circuits
The relentless push for high performance in custom digital circuits has led to renewed emphasis on circuit optimization or tuning. The parameters of the optimization are typically...
Chandramouli Visweswariah
BMCBI
2010
117views more  BMCBI 2010»
15 years 4 months ago
Identification of NAD interacting residues in proteins
Background: Small molecular cofactors or ligands play a crucial role in the proper functioning of cells. Accurate annotation of their target proteins and binding sites is required...
Hifzur Rahman Ansari, Gajendra P. S. Raghava
170
Voted
MIR
2010
ACM
191views Multimedia» more  MIR 2010»
15 years 8 months ago
Video retargeting with multi-scale trajectory optimization
Mobile devices are increasingly powerful in media storage and rendering. The prevalent request of decent video browsing on mobile devices is demanding. However, one limitation com...
Yuanning Li, YongHong Tian, Jingjing Yang, Ling-Yu...
IJIIDS
2008
201views more  IJIIDS 2008»
15 years 4 months ago
MALEF: Framework for distributed machine learning and data mining
: Growing importance of distributed data mining techniques has recently attracted attention of researchers in multiagent domain. Several agent-based application have been already c...
Jan Tozicka, Michael Rovatsos, Michal Pechoucek, S...