Sciweavers

4072 search results - page 394 / 815
» Designing an Optimal Network Using the Cross-Entropy Method
Sort
View
SIGECOM
2003
ACM
107views ECommerce» more  SIGECOM 2003»
15 years 10 months ago
Using value queries in combinatorial auctions
Combinatorial auctions, where bidders can bid on bundles of items are known to be desirable auction mechanisms for selling items that are complementary and/or substitutable. Howev...
Benoît Hudson, Tuomas Sandholm
125
Voted
LREC
2008
108views Education» more  LREC 2008»
15 years 6 months ago
Design of a Multimodal Database for Research on Automatic Detection of Severe Apnoea Cases
The aim of this paper is to present the design of a multimodal database suitable for research on new possibilities for automatic diagnosis of patients with severe obstructive slee...
Rubén Fernández Pozo, Luis A. Hern&a...
VLDB
2001
ACM
146views Database» more  VLDB 2001»
16 years 5 months ago
Combining multi-visual features for efficient indexing in a large image database
Abstract. The optimized distance-based access methods currently available for multidimensional indexing in multimedia databases have been developed based on two major assumptions: ...
Anne H. H. Ngu, Quan Z. Sheng, Du Q. Huynh, Ron Le...
MEMOCODE
2006
IEEE
15 years 10 months ago
Latency-insensitive design and central repetitive scheduling
The theory of latency-insensitive design (LID) was recently invented to cope with the time closure problem in otherwise synchronous circuits and programs. The idea is to allow the...
Julien Boucaron, Robert de Simone, Jean-Vivien Mil...
WSC
2007
15 years 7 months ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...