Sciweavers

2086 search results - page 64 / 418
» Mathematical Theory Exploration
Sort
View
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
14 years 1 months ago
Security-Driven Exploration of Cryptography in DSP Cores
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
Catherine H. Gebotys
P2P
2009
IEEE
121views Communications» more  P2P 2009»
14 years 3 months ago
Exploring the Optimal Chunk Selection Policy for Data-Driven P2P Streaming Systems
Data-driven P2P streaming systems can potentially provide good playback rate to a large number of viewers. One important design problem in such P2P systems is to determine the opt...
Bridge Q. Zhao, John Chi-Shing Lui, Dah-Ming Chiu
RC
2000
99views more  RC 2000»
13 years 8 months ago
Interval Constraint Plotting for Interactive Visual Exploration of Implicitly Defined Relations
Conventional plotting programs adopt techniques such as adaptive sampling to approximate, but not to guarantee, correctness and completeness in graphing functions. Moreover, implic...
Timothy J. Hickey, Zhe Qju, Maarten H. van Emden
CIKM
2010
Springer
13 years 6 months ago
Expert identification in community question answering: exploring question selection bias
Community Question Answering (CQA) services enables users to ask and answer questions. In these communities, there are typically a small number of experts amongst the large popula...
Aditya Pal, Joseph A. Konstan
ISIPTA
1999
IEEE
111views Mathematics» more  ISIPTA 1999»
14 years 1 months ago
Uncertainty and Information Measures for Imprecise Probabilities: An Overview
The paper deals with basic issues regarding the measurement of relevant types of uncertainty and uncertainty-based information in theories that represent imprecise probabilities o...
George J. Klir