Sciweavers

19866 search results - page 25 / 3974
» Computing all factorizations in ***
Sort
View
CEAS
2004
Springer
15 years 5 months ago
Shall We Stop All Unsolicited Email Messages?
Spam is commonly defined as unsolicited email messages, and the goal of spam filtering is to eliminate these messages. In this paper, we argue that not all unsolicited email messag...
Rui Dai, Kang Li
USAB
2008
15 years 1 months ago
How Image Based Factors and Human Factors Contribute to Threat Detection Performance in X-Ray Aviation Security Screening
The present study examines the relative importance of a series of known and expected factors that highly affect threat detection performance in aviation security X-ray screening. E...
Anton Bolfing, Tobias Halbherr, Adrian Schwaninger
AI
2002
Springer
14 years 11 months ago
A hierarchical approach to computer Hex
Hex is a beautiful game with simple rules and a strategic complexity comparable to that of Chess and Go. The massive game-tree search techniques developed mostly for Chess and suc...
Vadim V. Anshelevich
DDECS
2009
IEEE
111views Hardware» more  DDECS 2009»
15 years 6 months ago
0.5V 160-MHz 260uW all digital phase-locked loop
– A low power all-digital phase locked-loop (ADPLL) in a 0.13um CMOS process is presented. The pulse-based digitally controlled oscillator (PB-DCO) performs a high resolution and...
Jen-Chieh Liu, Hong-Yi Huang, Wei-Bin Yang, Kuo-Hs...
GLOBECOM
2008
IEEE
15 years 27 days ago
Windowing BitTorrent for Video-on-Demand: Not All is Lost with Tit-for-Tat
—In this paper we present findings from our windowing BitTorrent simulations and show that by carefully optimizing other factors a reasonable level of performance can be achieved...
Petri Savolainen, Niklas Raatikainen, Sasu Tarkoma