Sciweavers

13841 search results - page 2585 / 2769
» Algorithms and Constraint Programming
Sort
View
SIGCSE
2004
ACM
188views Education» more  SIGCSE 2004»
15 years 8 months ago
Buffer pools and file processing projects for an undergraduate data structures course
This paper presents a family of programming projects appropriate to a sophomore-level data structures course, centered around the concept of a buffer pool serving as the access i...
Clifford A. Shaffer
123
Voted
WMPI
2004
ACM
15 years 8 months ago
Understanding the effects of wrong-path memory references on processor performance
High-performance out-of-order processors spend a significant portion of their execution time on the incorrect program path even though they employ aggressive branch prediction al...
Onur Mutlu, Hyesoon Kim, David N. Armstrong, Yale ...
CG
2004
Springer
15 years 8 months ago
Searching over Metapositions in Kriegspiel
Kriegspiel is a Chess variant similar to wargames, in which players have to deal with uncertainty. Kriegspiel increases the difficulty typical of Chess by hiding from each player h...
Andrea Bolognesi, Paolo Ciancarini
CINQ
2004
Springer
131views Database» more  CINQ 2004»
15 years 8 months ago
Model-Independent Bounding of the Supports of Boolean Formulae in Binary Data
Abstract. Data mining algorithms such as the Apriori method for finding frequent sets in sparse binary data can be used for efficient computation of a large number of summaries fr...
Artur Bykowski, Jouni K. Seppänen, Jaakko Hol...
105
Voted
COCO
2004
Springer
78views Algorithms» more  COCO 2004»
15 years 8 months ago
Language Compression and Pseudorandom Generators
The language compression problem asks for succinct descriptions of the strings in a language A such that the strings can be efficiently recovered from their description when given...
Harry Buhrman, Troy Lee, Dieter van Melkebeek
« Prev « First page 2585 / 2769 Last » Next »