Sciweavers

4983 search results - page 195 / 997
» order 2008
Sort
View
SIAMSC
2008
117views more  SIAMSC 2008»
15 years 4 months ago
Adaptive, Fast, and Oblivious Convolution in Evolution Equations with Memory
To approximate convolutions which occur in evolution equations with memory terms, a variable-stepsize algorithm is presented for which advancing N steps requires only O(N log N) op...
María López-Fernández, Christ...
BIRTHDAY
2008
Springer
15 years 6 months ago
AND/OR Multi-valued Decision Diagrams for Constraint Networks
The paper is an overview of a recently developed compilation data structure for graphical models, with specific application to constraint networks. The AND/OR Multi-Valued Decision...
Robert Mateescu, Rina Dechter
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 10 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
118
Voted
JCIT
2008
102views more  JCIT 2008»
15 years 4 months ago
Modelling and Simulation for Physical Vapor
1 In this paper we present modeling and simulation for physical vapor deposition for metallic bipolar plates. In the models we discuss the application of different models to simula...
Jürgen Geiser, Robert Rohle
IOR
2007
74views more  IOR 2007»
15 years 4 months ago
Optimal Strategies for Sports Betting Pools
Abstract. Every fall, millions of Americans enter betting pools to pick winners of the weekly NFL football games. In the spring, NCAA tournament basketball pools are even more popu...
Bryan Clair, David Letscher