Sciweavers

9105 search results - page 57 / 1821
» Design of the MUC-6 evaluation
Sort
View
PAM
2005
Springer
14 years 1 months ago
Evaluating the Accuracy of Captured Snapshots by Peer-to-Peer Crawlers
The increasing popularity of Peer-to-Peer (P2P) networks has led to growing interest in characterizing their topology and dynamics [1–4], essential for proper design and effecti...
Daniel Stutzbach, Reza Rejaie
ATAL
1999
Springer
14 years 6 days ago
Toward a Methodology for AI Architecture Evaluation: Comparing Soar and CLIPS
We propose a methodology that can be used to compare and evaluate Artificial Intelligence architectures and is motivated by fundamental properties required by general intelligent ...
Scott A. Wallace, John E. Laird
CORR
2010
Springer
117views Education» more  CORR 2010»
13 years 5 months ago
Evaluating Modelling Approaches for Medical Image Annotations
Abstract. Information system designers face many challenges w.r.t. selecting appropriate semantic technologies and deciding on a modelling approach for their system. However, there...
Jasmin Opitz, Bijan Parsia, Ulrike Sattler
FPGA
2010
ACM
209views FPGA» more  FPGA 2010»
14 years 4 months ago
FPGA power reduction by guarded evaluation
Guarded evaluation is a power reduction technique that involves identifying sub-circuits (within a larger circuit) whose inputs can be held constant (guarded) at specific times d...
Chirag Ravishankar, Jason Helge Anderson
CASES
2009
ACM
14 years 2 months ago
Hardware evaluation of the Luffa hash family
Efficient hardware architectures for the Luffa hash algorithm are proposed in this work. We explore different tradeoffs and propose several architectures, targeting both compac...
Miroslav Knezevic, Ingrid Verbauwhede