Sciweavers

1245 search results - page 225 / 249
» Playing with Conway's problem
Sort
View
ECBS
1996
IEEE
93views Hardware» more  ECBS 1996»
14 years 26 days ago
A Methodology for Designing and Dimensioning Critical Complex Computing Systems
It is widely recognized that real-time,fault-tolerant and distributed computing technologies play a key role in the deployment of many current andfuture (civilian or Defense) crit...
Gérard Le Lann
IFIP
1994
Springer
14 years 23 days ago
Exploring user interfaces to improve learning outcomes
The concept of information landscapes has been a constant theme in the development of interactive multimedia packages. For the interface and access to this information to be effec...
John G. Hedberg, Barry Harper, Christine Brown, Ro...
CDC
2009
IEEE
137views Control Systems» more  CDC 2009»
14 years 20 days ago
Control of ramp-up current profile dynamics in tokamak plasmas via the minimal-surface theory
The central task of current profile control during the ramp-up phase of a tokamak discharge is to find the actuator trajectories that are necessary to achieve certain desired curre...
Chao Xu, Eugenio Schuster
SIGMOD
2010
ACM
196views Database» more  SIGMOD 2010»
14 years 19 days ago
Connected substructure similarity search
Substructure similarity search is to retrieve graphs that approximately contain a given query graph. It has many applications, e.g., detecting similar functions among chemical com...
Haichuan Shang, Xuemin Lin, Ying Zhang, Jeffrey Xu...
ICDCS
2010
IEEE
14 years 18 days ago
Existence Theorems and Approximation Algorithms for Generalized Network Security Games
—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread of viruses and worms (security breaches) in a network. In this model, nodes choose to i...
V. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun,...