Sciweavers

1474 search results - page 232 / 295
» Exploiting Locality in a TMS
Sort
View
SIGIR
2008
ACM
13 years 10 months ago
Classifiers without borders: incorporating fielded text from neighboring web pages
Accurate web page classification often depends crucially on information gained from neighboring pages in the local web graph. Prior work has exploited the class labels of nearby p...
Xiaoguang Qi, Brian D. Davison
SIGOPS
2008
174views more  SIGOPS 2008»
13 years 10 months ago
LAST: locality-aware sector translation for NAND flash memory-based storage systems
As flash memory technologies quickly improve, flashmemory-based storage devices are becoming a viable alternative as a secondary storage solution for general-purpose computing sys...
Sungjin Lee, Dongkun Shin, Young-Jin Kim, Jihong K...
IJNSEC
2007
147views more  IJNSEC 2007»
13 years 10 months ago
A Genetic Algorithm for Cryptanalysis of DES-8
Various cryptosystems exploit exhaustive techniques to search, missing-the-mark, key space. Such search techniques should be guided in order to be computationally adequate. Here, ...
Hasan Mohammed Hasan Husein, Bayoumi I. Bayoumi, F...
TASE
2008
IEEE
13 years 10 months ago
Automated Planning and Optimization of Lumber Production Using Machine Vision and Computed Tomography
An automated system for planning and optimization of lumber production using Machine Vision and Computed Tomography (CT) is proposed. Cross-sectional CT images of hardwood logs are...
Suchendra M. Bhandarkar, Xingzhi Luo, Richard F. D...
ANOR
2005
128views more  ANOR 2005»
13 years 10 months ago
Expectation-Stock Dynamics in Multi-Agent Fisheries
In this paper we consider a game-theoretic dynamic model describing the exploitation of a renewable resource. Our model is based on a Cournot oligopoly game where n profit-maximizi...
Gian Italo Bischi, Michael Kopel, Ferenc Szidarovs...