Sciweavers

1746 search results - page 290 / 350
» A linear implementation of PACMAN
Sort
View
FGCS
2008
127views more  FGCS 2008»
13 years 10 months ago
Monte Carlo methods for matrix computations on the grid
Many scientific and engineering applications involve inverting large matrices or solving systems of linear algebraic equations. Solving these problems with proven algorithms for d...
Simon Branford, Cihan Sahin, Ashish Thandavan, Chr...
CORR
2006
Springer
100views Education» more  CORR 2006»
13 years 10 months ago
Bilayer Low-Density Parity-Check Codes for Decode-and-Forward in Relay Channels
This paper describes an efficient implementation of binning for decode-and-forward (DF) in relay channels using lowdensity parity-check (LDPC) codes. Bilayer LDPC codes are devised...
Peyman Razaghi, Wei Yu
CORR
2006
Springer
74views Education» more  CORR 2006»
13 years 10 months ago
Scheduling Algorithms for Procrastinators
This paper presents scheduling algorithms for procrastinators, where the speed that a procrastinator executes a job increases as the due date approaches. We give optimal off-line ...
Michael A. Bender, Raphaël Clifford, Kostas T...
COGSCI
2007
85views more  COGSCI 2007»
13 years 10 months ago
Semantic Boost on Episodic Associations: An Empirically-Based Computational Model
Words become associated following repeated co-occurrence episodes. This process might be further determined by the semantic characteristics of the words. The present study focused...
Yaron Silberman, Shlomo Bentin, Risto Miikkulainen
ITIIS
2008
128views more  ITIIS 2008»
13 years 10 months ago
An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks
In spite of previous common assumptions about the incompatibility of public key cryptography (PKC) schemes with wireless sensor networks (WSNs), recent works have shown that they ...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...