Sciweavers

734 search results - page 131 / 147
» Computer Virus Propagation Models
Sort
View
ICPPW
2002
IEEE
14 years 10 days ago
Statistical Analysis of Connectivity in Unidirectional Ad Hoc Networks
A unidirectional link exists in an ad-hoc network when a node B is within the transmission range of another node A while node A cannot directly hear node B. However, a reverse rou...
Venugopalan Ramasubramanian, Daniel Mossé
EDBT
2009
ACM
135views Database» more  EDBT 2009»
14 years 1 days ago
Provenance for nested subqueries
Data provenance is essential in applications such as scientific computing, curated databases, and data warehouses. Several systems have been developed that provide provenance fun...
Boris Glavic, Gustavo Alonso
UAI
2008
13 years 8 months ago
Tightening LP Relaxations for MAP using Message Passing
Linear Programming (LP) relaxations have become powerful tools for finding the most probable (MAP) configuration in graphical models. These relaxations can be solved efficiently u...
David Sontag, Talya Meltzer, Amir Globerson, Tommi...
CGF
2008
124views more  CGF 2008»
13 years 7 months ago
Real-time Animation of Sand-Water Interaction
Recent advances in physically-based simulations have made it possible to generate realistic animations. However, in the case of solid-fluid coupling, wetting effects have rarely b...
Witawat Rungjiratananon, Zoltan Szego, Yoshihiro K...
EOR
2006
73views more  EOR 2006»
13 years 7 months ago
Path relinking and GRG for artificial neural networks
Artificial neural networks (ANN) have been widely used for both classification and prediction. This paper is focused on the prediction problem in which an unknown function is appr...
Abdellah El-Fallahi, Rafael Martí, Leon S. ...