Sciweavers

2066 search results - page 241 / 414
» Word Maturity: Computational Modeling of Word Knowledge
Sort
View
ACTA
2006
108views more  ACTA 2006»
15 years 4 months ago
Refinement verification of the lazy caching algorithm
The lazy caching algorithm of Afek, Brown, and Merrit (1993) is a protocol that allows the use of local caches with delayed updates. It results in a memory model that is not atomi...
Wim H. Hesselink
CN
2006
70views more  CN 2006»
15 years 4 months ago
Distribution of path durations in mobile ad-hoc networks - Palm's Theorem to the rescue
We first study the distribution of path duration in multi-hop wireless networks. We show that as the number of hops along a path increases, the path duration distribution can be a...
Yijie Han, Richard J. La, Armand M. Makowski, Seun...
IJON
2006
54views more  IJON 2006»
15 years 4 months ago
Self-organization of hierarchical visual maps with feedback connections
Visual areas in primates are known to have reciprocal connections. While the feedforward bottom-up processing of visual information has been studied extensively for decades, littl...
Yiu-Fai Sit, Risto Miikkulainen
JIRS
2006
131views more  JIRS 2006»
15 years 4 months ago
Inverse Kinematics of Human Arm Based on Multisensor Data Integration
The paper considers a technique for computation of the inverse kinematic model of the human arm. The approach is based on measurements of the hand position and orientation as well ...
Matjaz Mihelj
SIAMJO
2008
93views more  SIAMJO 2008»
15 years 4 months ago
Stochastic Programs with First-Order Dominance Constraints Induced by Mixed-Integer Linear Recourse
We propose a new class of stochastic integer programs whose special features are dominance constraints induced by mixed-integer linear recourse. For these models, we establish clo...
Ralf Gollmer, Frederike Neise, Rüdiger Schult...