Sciweavers

1290 search results - page 130 / 258
» New algorithms of the Q-learning type
Sort
View
ISPASS
2009
IEEE
14 years 3 months ago
Lonestar: A suite of parallel irregular programs
Until recently, parallel programming has largely focused on the exploitation of data-parallelism in dense matrix programs. However, many important application domains, including m...
Milind Kulkarni, Martin Burtscher, Calin Cascaval,...
GLVLSI
2007
IEEE
114views VLSI» more  GLVLSI 2007»
14 years 3 months ago
Design of mixed gates for leakage reduction
Leakage power dissipation is one of the most critical factors for the overall current dissipation and future designs. However, design techniques for the reduction of leakage power...
Frank Sill, Jiaxi You, Dirk Timmermann
ISCC
2005
IEEE
146views Communications» more  ISCC 2005»
14 years 2 months ago
A Credit-Based On-Demand QoS Routing Protocol over Bluetooth WPANs
The quality-of-service (QoS) communication that supports mobile applications to guarantee bandwidth utilization is an important issue for Bluetooth wireless personal area networks...
Yuh-Shyan Chen, Keng-Shau Liu, Yun-Wei Lin
PEWASUN
2005
ACM
14 years 2 months ago
Efficient deafness avoidance in wireless ad hoc and sensor networks with directional antennas
Using directional antennas in wireless ad hoc networks can significantly improve network performance. However, the deafness problem greatly limits the network performance. This pa...
Yihu Li, Ahmed M. Safwat
IEEEARES
2010
IEEE
14 years 2 months ago
Detection of Spyware by Mining Executable Files
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...