Sciweavers

2779 search results - page 497 / 556
» Modelling Immunological Memory
Sort
View
ENTCS
2002
145views more  ENTCS 2002»
13 years 10 months ago
Combining Monitors for Runtime System Verification
Runtime verification permits checking system properties that cannot be fully verified off-line. This is particularly true when the system includes complex third-party components, ...
Joshua Levy, Hassen Saïdi, Tomás E. Ur...
CORR
1998
Springer
82views Education» more  CORR 1998»
13 years 9 months ago
Name Strategy: Its Existence and Implications
It is argued that colour name strategy, object name strategy, and chunking strategy in memory are all aspects of the same general phenomena, called stereotyping, and this in turn ...
Mark D. Roberts
JMLR
2002
133views more  JMLR 2002»
13 years 9 months ago
Learning Precise Timing with LSTM Recurrent Networks
The temporal distance between events conveys information essential for numerous sequential tasks such as motor control and rhythm detection. While Hidden Markov Models tend to ign...
Felix A. Gers, Nicol N. Schraudolph, Jürgen S...
SIGPLAN
1998
13 years 9 months ago
Unloading Java Classes That Contain Static Fields
In Java the de nition of a \program" is a bit fuzzy. A Java applet is essentially a Java application (i.e. program) that can be executed by a Java enabled Web browser (i.e. a...
Charles E. McDowell, Elizabeth A. Baldwin
TPDS
1998
98views more  TPDS 1998»
13 years 9 months ago
A Basic-Cycle Calculation Technique for Efficient Dynamic Data Redistribution
—Array redistribution is usually required to enhance algorithm performance in many parallel programs on distributed memory multicomputers. Since it is performed at run-time, ther...
Yeh-Ching Chung, Ching-Hsien Hsu, Sheng-Wen Bai