Sciweavers

363 search results - page 25 / 73
» About paths with two blocks
Sort
View
AINA
2003
IEEE
14 years 3 months ago
Analysis of Delayed Reservation Scheme in Server-Based QoS Management Network
This paper proposes an analytical model for delayed reservation scheme, which can be exactly analyzed. By applying it to a server-based QoS management network, we can obtain the r...
Takeshi Ikenaga, Kenji Kawahara, Tetsuya Takine, Y...
VTS
1999
IEEE
83views Hardware» more  VTS 1999»
14 years 2 months ago
PADded Cache: A New Fault-Tolerance Technique for Cache Memories
This paper presents a new fault-tolerance technique for cache memories. Current fault-tolerance techniques for caches are limited either by the number of faults that can be tolera...
Philip P. Shirvani, Edward J. McCluskey
ECCC
2011
217views ECommerce» more  ECCC 2011»
13 years 1 months ago
ReachFewL = ReachUL
We show that two complexity classes introduced about two decades ago are equal. ReachUL is the class of problems decided by nondeterministic log-space machines which on every inpu...
Brady Garvin, Derrick Stolee, Raghunath Tewari, N....
IJCAI
2007
13 years 11 months ago
Is the Turing Test Good Enough? The Fallacy of Resource-Unbounded Intelligence
This goal of this paper is to defend the plausibility of the argument that passing the Turing test is a sufficient condition for the presence of intelligence. To this effect, we ...
Virginia Savova, Leonid Peshkin
JIPS
2010
273views more  JIPS 2010»
13 years 4 months ago
Hiding Secret Data in an Image Using Codeword Imitation
This paper proposes a novel reversible data hiding scheme based on a Vector Quantization (VQ) codebook. The proposed scheme uses the principle component analysis (PCA) algorithm to...
Zhi-Hui Wang, Chin-Chen Chang, Pei-Yu Tsai