Sciweavers

5675 search results - page 57 / 1135
» Exploiting Chaos for Computation
Sort
View
EWC
2006
114views more  EWC 2006»
13 years 11 months ago
Automated symmetry exploitation in engineering analysis
In engineering analysis, geometric symmetry, when exploited, has two potential benefits: (1) it can significantly reduce the computational time, and (2) it can simultaneously impr...
Krishnan Suresh, Ameya Sirpotdar
ICPP
2003
IEEE
14 years 4 months ago
Exploiting Client Caches: An Approach to Building Large Web Caches
New demands brought by the continuing growth of the Internet will be met in part by more effective and comprehensive use of caching. This paper proposes to exploit client browser ...
Yingwu Zhu, Yiming Hu
HUC
2007
Springer
14 years 5 months ago
Exploiting Social Interactions in Mobile Systems
Abstract. The popularity of handheld devices has created a flurry of research activity into new protocols and applications that can handle and exploit the defining characteristic...
Andrew G. Miklas, Kiran K. Gollu, Kelvin K. W. Cha...
CIG
2006
IEEE
14 years 5 months ago
Exploiting Sensor Symmetries in Example-based Training for Intelligent Agents
— Intelligent agents in games and simulators often operate in environments subject to symmetric transformations that produce new but equally legitimate environments, such as re...
Bobby D. Bryant, Risto Miikkulainen
ICPR
2010
IEEE
13 years 11 months ago
A Statistical Learning Approach to Spatial Context Exploitation for Semantic Image Analysis
In this paper, a statistical learning approach to spatial context exploitation for semantic image analysis is presented. The proposed method constitutes an extension of the key pa...
Georgios Th. Papadopoulos, Vasileios Mezaris, Ioan...