Sciweavers

2851 search results - page 482 / 571
» A Knowledge Based Approach on Educational Metadata Use
Sort
View
CORR
2010
Springer
130views Education» more  CORR 2010»
15 years 3 months ago
Phase Transitions for Greedy Sparse Approximation Algorithms
A major enterprise in compressed sensing and sparse approximation is the design and analysis of computationally tractable algorithms for recovering sparse, exact or approximate, s...
Jeffrey D. Blanchard, Coralia Cartis, Jared Tanner...
137
Voted
CORR
2008
Springer
139views Education» more  CORR 2008»
15 years 3 months ago
Exact two-terminal reliability of some directed networks
Abstract-- The calculation of network reliability in a probabilistic context has long been an issue of practical and academic importance. Conventional approaches (determination of ...
Christian Tanguy
CORR
2008
Springer
107views Education» more  CORR 2008»
15 years 3 months ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg
133
Voted
ANSOFT
1998
157views more  ANSOFT 1998»
15 years 3 months ago
Software Engineering Programmes are not Computer Science Programmes
Programmes in “Software Engineering” have become a source of contention in many universities. Computer Science departments, many of which have used that phrase to describe ind...
David Lorge Parnas
CORR
2010
Springer
140views Education» more  CORR 2010»
15 years 29 days ago
Soft Control on Collective Behavior of a Group of Autonomous Agents by a Shill Agent
This paper asks a new question: how can we control the collective behavior of self-organized multi-agent systems? We try to answer the question by proposing a new notion called `So...
Jing Han, Ming Li, Lei Guo