Sciweavers

5863 search results - page 1077 / 1173
» On Model-Checking of P Systems
Sort
View
SIAMADS
2010
105views more  SIAMADS 2010»
14 years 10 months ago
Nonlinear Patterns in Urban Crime: Hotspots, Bifurcations, and Suppression
We present a weakly nonlinear analysis of our recently developed model for the formation of crime patterns. Using a perturbative approach, we find amplitude equations that govern t...
Martin B. Short, Andrea L. Bertozzi, P. J. Brantin...
TASLP
2010
96views more  TASLP 2010»
14 years 10 months ago
Evaluating Source Separation Algorithms With Reverberant Speech
This paper examines the performance of several source separation systems on a speech separation task for which human intelligibility has previously been measured. For anechoic mixt...
Michael I. Mandel, S. Bressler, Barbara G. Shinn-C...
VIROLOGY
2010
165views more  VIROLOGY 2010»
14 years 10 months ago
IpMorph: fingerprinting spoofing unification
Abstract. There is nowadays a wide range of TCP/IP stack identification tools that allow to easily recognize the operating system of foreseen targets. The object of this article is...
Guillaume Prigent, Florian Vichot, Fabrice Harroue...
ALGORITHMICA
2011
14 years 7 months ago
Average Rate Speed Scaling
Speed scaling is a power management technique that involves dynamically changing the speed of a processor. This gives rise to dual-objective scheduling problems, where the operati...
Nikhil Bansal, David P. Bunde, Ho-Leung Chan, Kirk...
CCGRID
2011
IEEE
14 years 7 months ago
Towards Real-Time, Volunteer Distributed Computing
Many large-scale distributed computing applications demand real-time responses by soft deadlines. To enable such real-time task distribution and execution on the volunteer resourc...
Sangho Yi, Emmanuel Jeannot, Derrick Kondo, David ...
« Prev « First page 1077 / 1173 Last » Next »