Sciweavers

2028 search results - page 222 / 406
» Highly Predictive Blacklisting
Sort
View
SIGECOM
2010
ACM
149views ECommerce» more  SIGECOM 2010»
14 years 2 months ago
A behavioral study of bargaining in social networks
We report on a series of highly controlled human subject experiments in networked bargaining. The basic interaction between two players is the decision of how to share a mutual pa...
Tanmoy Chakraborty, J. Stephen Judd, Michael Kearn...
ICPR
2000
IEEE
14 years 1 months ago
Transparent Parallel Image Processing by way of a Familiar Sequential API
This paper describes an infrastructure that enables transparent development of image processing software for parallel computers. The infrastructure’s main component is an image ...
Frank J. Seinstra, Dennis Koelma
AE
1999
Springer
14 years 1 months ago
Characterizing Locality in Decoder-Based EAs for the Multidimensional Knapsack Problem
The performance of decoder-based evolutionary algorithms (EAs) strongly depends on the locality of the used decoder and operators. While many approaches to characterize locality ar...
Jens Gottlieb, Günther R. Raidl
ICCAD
1993
IEEE
100views Hardware» more  ICCAD 1993»
14 years 1 months ago
Macromodeling of the A.C. characteristics of CMOS Op-amps
An analytical-knowledge-based statistical method is developed to derive macromodels for the highly nonlinear A.C. response functions of CMOS Op-amp circuits. Simple circuit analys...
Pradip Mandal, V. Visvanathan
VLSID
1993
IEEE
114views VLSI» more  VLSID 1993»
14 years 1 months ago
A Methodology for Generating Application Specific Tree Multipliers
Low latency, application, specific multipliers are required for m,any DSP algorithms. Tree multipliers are an obvious answer to this requirement. However, tree architectures have ...
S. Ramanathan, Nibedita Mohanty, V. Visvanathan