Sciweavers

7200 search results - page 1217 / 1440
» On the Computational Power of Winner-Take-All
Sort
View
IJNSEC
2008
132views more  IJNSEC 2008»
13 years 10 months ago
Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks
This paper presents the Trust Level Routing (TLR) protocol, an extension of the optimized energy-delay routing (OEDR) protocol, focusing on the integrity, reliability and survivab...
Eyad Taqieddin, S. Jagannathan, Ann Miller
HEURISTICS
2006
102views more  HEURISTICS 2006»
13 years 10 months ago
A logic of soft constraints based on partially ordered preferences
Representing and reasoning with an agent's preferences is important in many applications of constraints formalisms. Such preferences are often only partially ordered. One clas...
Nic Wilson
IS
2008
13 years 10 months ago
Joining the results of heterogeneous search engines
In recent years, while search engines have become more and more powerful, several specialized search engines have been developed for different domains (e.g. library services, serv...
Daniele Braga, Alessandro Campi, Stefano Ceri, Ale...
CONCURRENCY
2007
95views more  CONCURRENCY 2007»
13 years 10 months ago
Automated and accurate cache behavior analysis for codes with irregular access patterns
Abstract. The memory hierarchy plays an essential role in the performance of current computers, thus good analysis tools that help predict and understand its behavior are required....
Diego Andrade, Manuel Arenaz, Basilio B. Fraguela,...
JAL
2008
89views more  JAL 2008»
13 years 10 months ago
Experimenting with parallelism for the instantiation of ASP programs
Abstract. In the last few years, the microprocessors technologies have been definitely moving to multi-core architectures, in order to improve performances as well as reduce power ...
Francesco Calimeri, Simona Perri, Francesco Ricca
« Prev « First page 1217 / 1440 Last » Next »