Sciweavers

3692 search results - page 728 / 739
» Active learning and its use in computer science
Sort
View
SODA
2008
ACM
104views Algorithms» more  SODA 2008»
15 years 3 months ago
Ranged hash functions and the price of churn
Ranged hash functions generalize hash tables to the setting where hash buckets may come and go over time, a typical case in distributed settings where hash buckets may correspond ...
James Aspnes, Muli Safra, Yitong Yin
IJCAI
1989
15 years 3 months ago
Stochastic Analysis of Qualitative Dynamics
We extend qualitative reasoning with estimations of the relative likelihoods of the pos sible qualitative behaviors . We estimate the likelihoods by viewing the dynamics o f a sys...
Jon Doyle, Elisha Sacks
ENTCS
2006
168views more  ENTCS 2006»
15 years 1 months ago
A Functional Programming Framework for Latency Insensitive Protocol Validation
Latency insensitive protocols (LIPs) have been proposed as a viable means to connect synchronous IP blocks via long interconnects in a system-on-chip. The reason why one needs to ...
Syed Suhaib, Deepak Mathaikutty, Sandeep K. Shukla...
124
Voted
JUCS
2002
116views more  JUCS 2002»
15 years 1 months ago
Bounded Flooding Routing Algorithm for Provisioning the Globally Optimal Route in a Hierarchical ATM Network
: ATM virtual path (VP) contains bundles of virtual channels (VCs). A VP layer network can be used as a server layer network of VC layer networks and each VC layer network can be a...
Daniel Won-Kyu Hong, Choong Seon Hong, Dong-Sik Yu...
130
Voted
NAR
2010
281views more  NAR 2010»
14 years 8 months ago
PDBselect 1992-2009 and PDBfilter-select
PDBselect (http://bioinfo.tg.fh-giessen.de/pdb select/) is a list of representative protein chains with low mutual sequence identity selected from the protein data bank (PDB) to e...
Sven Griep, Uwe Hobohm