Sciweavers

80 search results - page 14 / 16
» Pattern avoidance and the Bruhat order
Sort
View
PROCEDIA
2010
140views more  PROCEDIA 2010»
13 years 5 months ago
Jaccard Index based availability prediction in enterprise grids
Enterprise Grid enables sharing and aggregation of a set of computing or storage resources connected by enterprise network, but the availability of the resources in this environme...
Mustafizur Rahman 0003, Md. Rafiul Hassan, Rajkuma...
DMIN
2006
131views Data Mining» more  DMIN 2006»
13 years 8 months ago
Use of Data Mining to Determine Cheating in Online Student Assessment
are proposing a model to help organizations detect and prevent cheats in online assessments. First we analyze different student personalities, stress situations generated by onlin...
Alberto Ochoa, Amol Wagholikar
TIP
2002
105views more  TIP 2002»
13 years 6 months ago
Tree-structured method for LUT inverse halftoning and for image halftoning
1 Recently the authors proposed a Look Up Table (LUT) based method for inverse halftoning of images. The LUT for inverse halftoning is obtained from the histogram gathered from a f...
Murat Mese, Palghat P. Vaidyanathan
NAS
2010
IEEE
13 years 5 months ago
CR: Capability Information for Routing of Wireless Ad Hoc Networks in the Real Environment
—In greedy routing, each relay node forwards the message to a neighbor (also called successor) that is closer to the destination. However, the successor candidate set (SCS) is di...
Zhen Jiang, Zhigang Li, Nong Xiao, Jie Wu
ET
2002
115views more  ET 2002»
13 years 6 months ago
CAS-BUS: A Test Access Mechanism and a Toolbox Environment for Core-Based System Chip Testing
As System on a Chip (SoC) testing faces new challenges, some new test architectures must be developed. This paper describes a Test Access Mechanism (TAM) named CASBUS that solves ...
Mounir Benabdenbi, Walid Maroufi, Meryem Marzouki