This paper describes several algorithms to perform all-to-all communication on a two-dimensional mesh connected computer with wormhole routing. We discuss both direct algorithms, ...
We estimate the number of active machines per hour infected with the Conficker-C worm, using a probability model of Conficker-C's UDP P2P scanning behavior. For an observer wi...
— We study the issue of handling unknown inter-cell interference in multi-cell environments with antenna arrays at the base stations. First, we demonstrate that the presence of u...
This paper discusses the performance of a hybrid system which consists of EDP and GP. EDP, Estimation of Distribution Programming, is the program evolution method based on the prob...
The field of intelligent tutoring systems has been using the well known knowledge tracing model, popularized by Corbett and Anderson (1995) to track individual users’ knowledge f...