Sciweavers

2034 search results - page 287 / 407
» On the Comparability of Software Clustering Algorithms
Sort
View
UIST
2003
ACM
14 years 1 months ago
Rhythm modeling, visualizations and applications
People use their awareness of others' temporal patterns to plan work activities and communication. This paper presents algorithms for programatically detecting and modeling t...
James Begole, John C. Tang, Rosco Hill
GLOBECOM
2007
IEEE
13 years 12 months ago
Efficient Scheduling for Heterogeneous Services in OFDMA Downlink
We consider optimal allocation of resources to users in a downlink OFDMA system to support heterogeneous applications consisting of both deadline-sensitive (DS) and best-effort (BE...
Rajiv Agarwal, Vinay R. Majjigi, Rath Vannithamby,...
ERSA
2008
103views Hardware» more  ERSA 2008»
13 years 9 months ago
A Hardware Accelerator for k-th Nearest Neighbor Thinning
This paper presents an accelerator for k-th nearest neighbor thinning, a run time intensive algorithmic kernel used in recent multi-objective optimizers. We discuss the thinning al...
Tobias Schumacher, Robert Meiche, Paul Kaufmann, E...
GRAPHICSINTERFACE
2003
13 years 9 months ago
Easy Realignment of k-DOP Bounding Volumes
In this paper we reconsider pairwise collision detection for rigid motions using a k-DOP bounding volume hierarchy. This data structure is particularly attractive because it is eq...
Christoph Fünfzig, Dieter W. Fellner
CORR
2010
Springer
140views Education» more  CORR 2010»
13 years 8 months ago
Performance Evaluation of DCA and SRC on a Single Bot Detection
: Malicious users try to compromise systems using new techniques. One of the recent techniques used by the attacker is to perform complex distributed attacks such as denial of serv...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith