Sciweavers

1016 search results - page 156 / 204
» Explore or Exploit
Sort
View
TSP
2008
92views more  TSP 2008»
13 years 7 months ago
Distributed Structures, Sequential Optimization, and Quantization for Detection
Abstract--In the design of distributed quantization systems one inevitably confronts two types of constraints--those imposed by a distributed system's structure and those impo...
Michael A. Lexa, Don H. Johnson
JSAC
2007
105views more  JSAC 2007»
13 years 7 months ago
Inferring Network-Wide Quality in P2P Live Streaming Systems
—This paper explores how to remotely monitor network-wide quality in mesh-pull P2P live streaming systems. Peers in such systems advertise to each other buffer maps which summari...
Xiaojun Hei, Yong Liu, Keith W. Ross
UMUAI
2008
108views more  UMUAI 2008»
13 years 7 months ago
Developing a generalizable detector of when students game the system
Some students, when working in interactive learning environments, attempt to "game the system", attempting to succeed in the environment by exploiting properties of the s...
Ryan Shaun Joazeiro de Baker, Albert T. Corbett, I...
VC
2008
143views more  VC 2008»
13 years 7 months ago
A single-pass GPU ray casting framework for interactive out-of-core rendering of massive volumetric datasets
We present an adaptive out-of-core technique for rendering massive scalar volumes employing single pass GPU raycasting. The method is based on the decomposition of a volumetric dat...
Enrico Gobbetti, Fabio Marton, José Antonio...
CAD
2004
Springer
13 years 7 months ago
Customizability analysis in design for mass customization
Product customization has been recognized as an effective means to implement mass customization. This paper focuses on the customizability issue of design, that is, to evaluate th...
Jianxin Jiao, Mitchell M. Tseng