Sciweavers

1075 search results - page 133 / 215
» Calculating the Number of Tunnels
Sort
View
APSCC
2007
IEEE
14 years 4 months ago
An Agent Scheduling Optimization for Call Centers
A suitable assignment of agents to handle the workload at a call center is not easy to fulfill because it requires a combinatorial optimization with large solution space and the n...
Chiaki Hishinuma, Masaaki Kanakubo, Takuma Goto
ARITH
2007
IEEE
14 years 4 months ago
Decimal Floating-Point Multiplication Via Carry-Save Addition
Decimal multiplication is important in many commercial applications including financial analysis, banking, tax calculation, currency conversion, insurance, and accounting. This p...
Mark A. Erle, Michael J. Schulte, Brian J. Hickman...
DATE
2007
IEEE
109views Hardware» more  DATE 2007»
14 years 4 months ago
Area optimization of multi-cycle operators in high-level synthesis
Conventional high-level synthesis algorithms usually employ multi-cycle operators to reduce the cycle length in order to improve the circuit performance. These operators need seve...
María C. Molina, Rafael Ruiz-Sautua, Jose M...
ENC
2007
IEEE
14 years 4 months ago
fMRI Brain Image Retrieval Based on ICA Components
This manuscript proposes a retrieval system for fMRI brain images. Our goal is to find a similaritymetric to enable us to support queries for “similar tasks” for retrieval on...
Bing Bai, Paul B. Kantor, Ali Shokoufandeh, Debora...
ICC
2007
IEEE
111views Communications» more  ICC 2007»
14 years 4 months ago
SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures
— In this paper, we introduce a new scheme called SecureRank for prioritizing vulnerabilities to patch in computing systems/networks. This has become a key issue for IT infrastru...
Reiko Ann Miura-Ko, Nicholas Bambos