Sciweavers

2044 search results - page 296 / 409
» System theory for numerical analysis
Sort
View
HICSS
2005
IEEE
126views Biometrics» more  HICSS 2005»
15 years 10 months ago
Email Chronemics: Unobtrusive Profiling of Response Times
One of the unknowns of emailing is the time it will take the receiver to form and post a reply. Response times vary considerably, and the chronemics of email are an important non-...
Yoram M. Kalman, Sheizaf Rafaeli
VISSOFT
2005
IEEE
15 years 10 months ago
The Dominance Tree in Visualizing Software Dependencies
Dominance analysis from graph theory allows one to locate subordinated software elements in a rooted dependency graph. It identifies the nesting structure for a dependency graph ...
Raimar Falke, Raimund Klein, Rainer Koschke, Joche...
PEWASUN
2005
ACM
15 years 10 months ago
Weak signal detection performance of selective rake receivers in fading channels
We derive the optimum and suboptimum selective rake receivers (SRRs) for fading environment exhibiting impulsive nature. Simulation results confirm that, when the noise is impuls...
Jinsoo Bae, Sang Won Choi, So Ryoung Park, Jongho ...
SIGECOM
2005
ACM
153views ECommerce» more  SIGECOM 2005»
15 years 10 months ago
Marginal contribution nets: a compact representation scheme for coalitional games
We present a new approach to representing coalitional games based on rules that describe the marginal contributions of the agents. This representation scheme captures characterist...
Samuel Ieong, Yoav Shoham
GECCO
2005
Springer
137views Optimization» more  GECCO 2005»
15 years 10 months ago
Constant generation for the financial domain using grammatical evolution
This study reports the work to date on the analysis of different methodologies for constant creation with the aim of applying the most advantageous method to the dynamic real wor...
Ian Dempsey