Sciweavers

7200 search results - page 1238 / 1440
» On the Computational Power of Winner-Take-All
Sort
View
JDCTA
2010
143views more  JDCTA 2010»
13 years 5 months ago
A Potent Model for Unwanted Traffic Detection in QoS Network Domain
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali
SIAMREV
2010
114views more  SIAMREV 2010»
13 years 5 months ago
From Random Polygon to Ellipse: An Eigenanalysis
Suppose x and y are unit 2-norm n-vectors whose components sum to zero. Let P(x, y) be the polygon obtained by connecting (x1, y1), . . . , (xn, yn), (x1, y1) in order. We say that...
Adam N. Elmachtoub, Charles F. Van Loan
SIGMOD
2010
ACM
166views Database» more  SIGMOD 2010»
13 years 5 months ago
FAST: fast architecture sensitive tree search on modern CPUs and GPUs
In-memory tree structured index search is a fundamental database operation. Modern processors provide tremendous computing power by integrating multiple cores, each with wide vect...
Changkyu Kim, Jatin Chhugani, Nadathur Satish, Eri...
SOCINFO
2010
13 years 5 months ago
SocialWiki: Bring Order to Wiki Systems with Social Context
A huge amount of administrative effort is required for large wiki systems to produce and maintain high quality pages with existing naive access control policies. This paper introdu...
Haifeng Zhao, Shaozhi Ye, Prantik Bhattacharyya, J...
TITS
2010
201views Education» more  TITS 2010»
13 years 5 months ago
A Review of the Applications of Agent Technology in Traffic and Transportation Systems
The agent computing paradigm is rapidly emerging as one of the powerful technologies for the development of largescale distributed systems to deal with the uncertainty in a dynamic...
Bo Chen, Harry H. Cheng
« Prev « First page 1238 / 1440 Last » Next »