Sciweavers

1862 search results - page 217 / 373
» Constrained pattern matching
Sort
View
121
Voted
USENIX
2004
15 years 4 months ago
High Performance X Servers in the Kdrive Architecture
The common usage patterns of 2D drivers for the X Window System have changed over time. New extensions such as Render and Composite are creating new demands for 2D rendering which...
Eric Anholt
AINA
2007
IEEE
15 years 3 months ago
Detecting Anomaly Node Behavior in Wireless Sensor Networks
Wireless sensor networks are usually deployed in a way “once deployed, never changed”. The actions of sensor nodes are either pre-scheduled inside chips or triggered to respon...
Qinghua Wang, Tingting Zhang
140
Voted
CAL
2002
15 years 3 months ago
Worst-case Traffic for Oblivious Routing Functions
This paper presents an algorithm to find a worst-case traffic pattern for any oblivious routing algorithm on an arbitrary interconnection network topology. The linearity of channe...
Brian Towles, William J. Dally
IJON
2002
83views more  IJON 2002»
15 years 3 months ago
Modeling temporal combination selective neurons of the songbird
Some neurons in the nucleus HVc of the songbird respond vigorously to sequences of syllables as they appear in the bird's own song (such as AB), but they respond weakly or no...
Patrick J. Drew, L. F. Abbott
PR
2007
84views more  PR 2007»
15 years 2 months ago
Attention-based similarity
A similarity measure is described that does not require the prior specification of features or the need for training sets of representative data. Instead large numbers of feature...
Fred Stentiford