Sciweavers

1039 search results - page 138 / 208
» networks 1998
Sort
View
IPPS
1998
IEEE
14 years 1 months ago
Deterministic Routing of h-relations on the Multibutterfly
In this paper we devise an optimal deterministic algorithm for routing h-relations on-line on an N-input/output multibutterfly. The algorithm, which is obtained by generalizing th...
Andrea Pietracaprina
PVM
1998
Springer
14 years 1 months ago
Implementing MPI with the Memory-Based Communication Facilities on the SSS-CORE Operating System
This paper describes an e cient implementation of MPI on the Memory-Based Communication Facilities; Memory-Based FIFO is used for bu ering by the library, and Remote Write for comm...
Kenji Morimoto, Takashi Matsumoto, Kei Hiraki
UMUAI
1998
157views more  UMUAI 1998»
13 years 8 months ago
Bayesian Models for Keyhole Plan Recognition in an Adventure Game
We present an approach to keyhole plan recognition which uses a dynamic belief (Bayesian) network to represent features of the domain that are needed to identify users’ plans and...
David W. Albrecht, Ingrid Zukerman, Ann E. Nichols...
CORR
2010
Springer
81views Education» more  CORR 2010»
13 years 9 months ago
On the size of identifying codes in triangle-free graphs
In an undirected graph G = (V, E), a subset C V such that C is a dominating set of G, and each vertex in V is dominated by a distinct subset of vertices from C, is called an iden...
Florent Foucaud, Ralf Klasing, Adrian Kosowski, An...
TIT
1998
126views more  TIT 1998»
13 years 8 months ago
An Asymptotic Property of Model Selection Criteria
—Probability models are estimated by use of penalized log-likelihood criteria related to AIC and MDL. The accuracies of the density estimators are shown to be related to the trad...
Yuhong Yang, Andrew R. Barron