Sciweavers

2084 search results - page 285 / 417
» Knowledge Exploitation from the Web
Sort
View
GLOBECOM
2006
IEEE
14 years 4 months ago
A Distributed Opportunistic Access Scheme for OFDMA Systems
Abstract— In this paper, we propose a distributed opportunistic access scheme for uplink OFDMA systems. The sub-carriers are grouped into several sub-channels. Users access these...
Dandan Wang, Hlaing Minn, Naofal Al-Dhahir
ITC
2003
IEEE
129views Hardware» more  ITC 2003»
14 years 4 months ago
Relating Yield Models to Burn-In Fall-Out in Time
An early-life reliability model is presented that allows wafer test information to be used to predict not only the total number of burn-in failures that occur for a given product,...
Thomas S. Barnett, Adit D. Singh
SP
2000
IEEE
14 years 3 months ago
A Practically Implementable and Tractable Delegation Logic
We address the goal of making Delegation Logic (DL) into a practically implementable and tractable trustmanagement system. DL [22] is a logic-based knowledge representation (i.e.,...
Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum
AI
1998
Springer
14 years 3 months ago
A Hybrid Genetic Algorithm for the Vehicle Routing Problem with Time Windows
A variety of hybrid genetic algorithms has been recently proposed to address the vehicle routing problem with time windows (VRPTW), a problem known to be NP-hard. However, very few...
Jean Berger, Martin Salois, Regent Begin
ICALP
1998
Springer
14 years 2 months ago
A Neuroidal Architecture for Cognitive Computation
An architecture is described for designing systems that acquire and manipulate large amounts of unsystematized, or so-called commonsense, knowledge. Its aim is to exploit to the fu...
Leslie G. Valiant