Sciweavers

1016 search results - page 82 / 204
» Explore or Exploit
Sort
View
ICCAD
2002
IEEE
103views Hardware» more  ICCAD 2002»
14 years 6 months ago
A realistic variable voltage scheduling model for real-time applications
Voltage scheduling is indispensable for exploiting the benefit of variable voltage processors. Though extensive research has been done in this area, current processor limitations...
Bren Mochocki, Xiaobo Sharon Hu, Gang Quan
CRV
2009
IEEE
156views Robotics» more  CRV 2009»
14 years 3 months ago
A Bayesian Algorithm for Reading 1D Barcodes
The 1D barcode is a ubiquitous labeling technology, with symbologies such as UPC used to label approximately 99% of all packaged goods in the US. It would be very convenient for c...
Ender Tekin, James Coughlan
CSMR
2009
IEEE
14 years 3 months ago
EvoSpaces: Multi-dimensional Navigation Spaces for Software Evolution
EvoSpaces is a Swiss-wide research project sponsored by the Hasler foundation. It involves three partners: University of Zurich, University of Lugano and the University of Applied...
Michele Lanza, Harald Gall, Philippe Dugerdil
IWANN
2009
Springer
14 years 3 months ago
TEMMAS: The Electricity Market Multi-Agent Simulator
—This paper describes a multi-agent based simulation (MABS) framework to construct an artificial electric power market populated with learning agents. The artificial market, na...
Paulo Trigo, Paulo Marques, Helder Coelho
SIGIR
2009
ACM
14 years 3 months ago
Using wikipedia categories for ad hoc search
In this paper we explore the use of category information for ad hoc retrieval in Wikipedia. We show that techniques for entity ranking exploiting this category information can als...
Rianne Kaptein, Marijn Koolen, Jaap Kamps