Sciweavers

2774 search results - page 457 / 555
» Exploiting Deep Structure
Sort
View
EOR
2006
104views more  EOR 2006»
15 years 4 months ago
Financial networks with intermediation: Risk management with variable weights
: In this paper, we develop a framework for the modeling, analysis, and computation of solutions to multitiered financial network problems with intermediaries in which both the sou...
Anna Nagurney, Ke Ke
CAL
2007
15 years 4 months ago
A Building Block for Coarse-Grain Optimizations in the On-Chip Memory Hierarchy
Current on-chip block-centric memory hierarchies exploit access patterns at the fine-grain scale of small blocks. Several recently proposed memory hierarchy enhancements for coher...
Jason Zebchuk, Andreas Moshovos
GRID
2006
Springer
15 years 4 months ago
Applying Peer-to-Peer Techniques to Grid Replica Location Services
Peer-to-peer systems offer attractive system management properties, including the ability of components that join the network to self-organize; scalability up to tens of thousands...
Ann L. Chervenak, Min Cai
CE
2007
100views more  CE 2007»
15 years 4 months ago
Educational resources and implementation of a Greek sign language synthesis architecture
In this paper, we present how creation and dynamic synthesis of linguistic resources of Greek Sign Language (GSL) may serve to support development and provide content to an educat...
Kostas Karpouzis, George Caridakis, Stavroula-Evit...
ISCI
2008
116views more  ISCI 2008»
15 years 4 months ago
Discovery of maximum length frequent itemsets
The use of frequent itemsets has been limited by the high computational cost as well as the large number of resulting itemsets. In many real-world scenarios, however, it is often ...
Tianming Hu, Sam Yuan Sung, Hui Xiong, Qian Fu