Sciweavers

3946 search results - page 765 / 790
» The computational complexity of choice sets
Sort
View
FDL
2008
IEEE
15 years 11 months ago
Contradiction Analysis for Constraint-based Random Simulation
Constraint-based random simulation is state-of-the-art in verification of multi-million gate industrial designs. This method is based on stimulus generation by constraint solving...
Daniel Große, Robert Wille, Robert Siegmund,...
P2P
2008
IEEE
102views Communications» more  P2P 2008»
15 years 11 months ago
Free-Riding, Fairness, and Firewalls in P2P File-Sharing
Peer-to-peer file-sharing networks depend on peers uploading data to each other. Some peers, called free-riders, will not upload data unless there is an incentive to do so. Algor...
Jacob Jan-David Mol, Johan A. Pouwelse, Dick H. J....
149
Voted
VR
2008
IEEE
128views Virtual Reality» more  VR 2008»
15 years 11 months ago
GVT: a platform to create virtual environments for procedural training
The use of Virtual Environments for Training is strongly stimulated by important needs for training on sensitive equipments. Yet, developing such an application is often done with...
Stéphanie Gerbaud, Nicolas Mollet, Franck G...
CEC
2007
IEEE
15 years 11 months ago
MRI brain image segmentation by fuzzy symmetry based genetic clustering technique
—In this paper, an automatic segmentation technique of multispectral magnetic resonance image of the brain using a new fuzzy point symmetry based genetic clustering technique is ...
Sriparna Saha, Sanghamitra Bandyopadhyay
COMSWARE
2007
IEEE
15 years 11 months ago
On Optimal Performance in Mobile Ad hoc Networks
In this paper we are concerned with finding the maximum throughput that a mobile ad hoc network can support. Even when nodes are stationary, the problem of determining the capaci...
Tapas K. Patra, Joy Kuri, Pavan Nuggehalli