Sciweavers

825 search results - page 24 / 165
» Internal Iteration Externalized
Sort
View
IEEEIAS
2009
IEEE
14 years 2 months ago
Detecting Insider Attacks Using Non-negative Matrix Factorization
—It is a fact that vast majority of attention is given to protecting against external threats, which are considered more dangerous. However, some industrial surveys have indicate...
Jan Platos, Václav Snásel, Pavel Kr&...
ECAL
2005
Springer
14 years 1 months ago
Hysteresis and the Limits of Homeostasis: From Daisyworld to Phototaxis
All biological organisms must be able to regulate certain essential internal variables, e.g. core body temperature in mammals, in order to survive. Almost by definition, those that...
James Dyke, Inman Harvey
WAE
2000
128views Algorithms» more  WAE 2000»
13 years 9 months ago
Planar Point Location for Large Data Sets: To Seek or Not to Seek
We present an algorithm for external memory planar point location that is both effective and easy to implement. The base algorithm is an external memory variant of the bucket metho...
Jan Vahrenhold, Klaus Hinrichs
ICCD
2001
IEEE
144views Hardware» more  ICCD 2001»
14 years 5 months ago
An Area-Efficient Iterative Modified-Booth Multiplier Based on Self-Timed Clocking
A new iterative multiplier based on a self-timed clocking scheme is presented. To reduce the area required for the multiplier, only two CSA rows are iteratively used to complete a...
Myoung-Cheol Shin, Se-Hyeon Kang, In-Cheol Park
MLQ
2008
106views more  MLQ 2008»
13 years 8 months ago
A general Mitchell style iteration
We work out the details of a schema for a mixed support forcing iteration, which generalizes the Mitchell model [7] with no Aronszajn trees on 2. The main purpose of this paper is ...
John Krueger