Sciweavers

12257 search results - page 398 / 2452
» Analysis of Algorithms
Sort
View
HICSS
2003
IEEE
148views Biometrics» more  HICSS 2003»
15 years 10 months ago
Bluenet II - A Detailed Realization of the Algorithm and Performance
The recent interest in ad hoc networks, in general, and in the Bluetooth technology, in particular, has stimulated much research in algorithms for topology control of such network...
Zhifang Wang, Zygmunt J. Haas, Robert J. Thomas
162
Voted
FOCS
1999
IEEE
15 years 9 months ago
A Probabilistic Algorithm for k-SAT and Constraint Satisfaction Problems
We present a simple probabilistic algorithm for solving kSAT, and more generally, for solving constraint satisfaction problems (CSP). The algorithm follows a simple localsearch pa...
Uwe Schöning
173
Voted
DAMON
2006
Springer
15 years 8 months ago
Processing-in-memory technology for knowledge discovery algorithms
The goal of this work is to gain insight into whether processingin-memory (PIM) technology can be used to accelerate the performance of link discovery algorithms, which represent ...
Jafar Adibi, Tim Barrett, Spundun Bhatt, Hans Chal...
DEBS
2008
ACM
15 years 6 months ago
Relative temporal constraints in the Rete algorithm for complex event detection
Complex Event Processing is an important technology for information systems with a broad application space ranging from supply chain management, systems monitoring, and stock mark...
Karen Walzer, Tino Breddin, Matthias Groch
DAGSTUHL
2001
15 years 6 months ago
Understanding Algorithms by Means of Visualized Path Testing
Visualization of an algorithm offers only a rough picture of operations. Explanations are crucial for deeper understanding, because they help the viewer to associate the visualiza...
Ari Korhonen, Erkki Sutinen, Jorma Tarhio