Sciweavers

4281 search results - page 12 / 857
» How to Disembed a Program
Sort
View
CORR
2010
Springer
92views Education» more  CORR 2010»
13 years 7 months ago
How Do Emerging Technologies Conquer the World? An Exploration of Patterns of Diffusion and Network Formation
Grasping the fruits of "emerging technologies" is an objective of many government priority programs in a knowledge-based and globalizing economy. We use the publication ...
Loet Leydesdorff, Ismael Rafols
ESA
2010
Springer
197views Algorithms» more  ESA 2010»
13 years 5 months ago
How to Allocate Goods in an Online Market?
Abstract. We study an online version of Fisher's linear case market. In this market there are m buyers and a set of n dividable goods to be allocated to the buyers. The utilit...
Yossi Azar, Niv Buchbinder, Kamal Jain
EVOW
2009
Springer
13 years 5 months ago
Conquering the Needle-in-a-Haystack: How Correlated Input Variables Beneficially Alter the Fitness Landscape for Neural Networks
Abstract. Evolutionary algorithms such as genetic programming and grammatical evolution have been used for simultaneously optimizing network architecture, variable selection, and w...
Stephen D. Turner, Marylyn D. Ritchie, William S. ...
DAC
2011
ACM
12 years 7 months ago
Litmus tests for comparing memory consistency models: how long do they need to be?
Memory consistency litmus tests are small parallel programs that are designed to illustrate subtle differences between memory consistency models by exhibiting different outcomes...
Sela Mador-Haim, Rajeev Alur, Milo M. K. Martin
NC
2008
13 years 7 months ago
How crystals that sense and respond to their environments could evolve
An enduring mystery in biology is how a physical entity simple enough to have arisen spontaneously could have evolved into the complex life seen on Earth today. Cairns-Smith has pr...
Rebecca Schulman, Erik Winfree