Sciweavers

135 search results - page 12 / 27
» Key challenges in agent-based modelling for geo-spatial simu...
Sort
View
ISCA
2011
IEEE
294views Hardware» more  ISCA 2011»
12 years 11 months ago
Moguls: a model to explore the memory hierarchy for bandwidth improvements
In recent years, the increasing number of processor cores and limited increases in main memory bandwidth have led to the problem of the bandwidth wall, where memory bandwidth is b...
Guangyu Sun, Christopher J. Hughes, Changkyu Kim, ...
WSC
2000
13 years 8 months ago
Circumstance descriptors: a method for generating plan modifications and fragmentary orders
Circumstance Descriptors are offered as a way to organize spatial and other military knowledge that may be difficult to formulate, particularly the kinds of details that are most ...
John B. Gilmer Jr.
SIGMETRICS
2011
ACM
229views Hardware» more  SIGMETRICS 2011»
12 years 10 months ago
Model-driven optimization of opportunistic routing
Opportunistic routing aims to improve wireless performance by exploiting communication opportunities arising by chance. A key challenge in opportunistic routing is how to achieve ...
Eric Rozner, Mi Kyung Han, Lili Qiu, Yin Zhang
ICDM
2009
IEEE
141views Data Mining» more  ICDM 2009»
13 years 5 months ago
Ensemble-Vis: A Framework for the Statistical Visualization of Ensemble Data
Scientists increasingly use ensemble data sets to explore relationships present in dynamic systems. Ensemble data sets combine spatio-temporal simulation results generated using mu...
Kristin Potter, Andrew Wilson, Peer-Timo Bremer, D...
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
14 years 28 days ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala