Sciweavers

15660 search results - page 3110 / 3132
» The Unbalance of Set Systems
Sort
View
IJHPCA
2010
105views more  IJHPCA 2010»
13 years 8 months ago
A Pipelined Algorithm for Large, Irregular All-Gather Problems
We describe and evaluate a new, pipelined algorithm for large, irregular all-gather problems. In the irregular all-gather problem each process in a set of processes contributes in...
Jesper Larsson Träff, Andreas Ripke, Christia...
INFOCOM
2010
IEEE
13 years 8 months ago
Scalable NIDS via Negative Pattern Matching and Exclusive Pattern Matching
i In this paper, we identify the unique challenges in deploying parallelism on TCAM-based pattern matching for Network Intrusion Detection Systems (NIDSes). We resolve two critica...
Kai Zheng, Xin Zhang, Zhiping Cai, Zhijun Wang, Ba...
INFOCOM
2010
IEEE
13 years 8 months ago
Low-complexity Scheduling Algorithms for Multi-channel Downlink Wireless Networks
—This paper considers the problem of designing scheduling algorithms for multi-channel (e.g., OFDM) wireless downlink networks with n users/OFDM sub-channels. For this system, wh...
Shreeshankar Bodas, Sanjay Shakkottai, Lei Ying, R...
JAIR
2010
165views more  JAIR 2010»
13 years 8 months ago
A Model-Based Active Testing Approach to Sequential Diagnosis
Model-based diagnostic reasoning often leads to a large number of diagnostic hypotheses. The set of diagnoses can be reduced by taking into account extra observations (passive mon...
Alexander Feldman, Gregory M. Provan, Arjan J. C. ...
JAPLL
2010
98views more  JAPLL 2010»
13 years 8 months ago
Formalization of the ad hominem argumentation scheme
In this paper, several examples from the literature, and one central new one, are used as case studies of texts of discourse containing an argumentation scheme that has now been w...
Douglas Walton
« Prev « First page 3110 / 3132 Last » Next »