Sciweavers

628 search results - page 114 / 126
» Designing the perfect auction
Sort
View
88
Voted
DATESO
2007
107views Database» more  DATESO 2007»
14 years 11 months ago
Work with Knowledge on the Internet - Local Search
Authors are looking within their research grant new original web local search algorithm respecting specifics of Czech national environment. We would like to initiate further debate...
Antonin Pavlicek, Josef Muknsnabl
SODA
2008
ACM
96views Algorithms» more  SODA 2008»
14 years 11 months ago
Unconditionally reliable message transmission in directed networks
In the unconditionally reliable message transmission (URMT) problem, two non-faulty players, the sender S and the receiver R are part of a synchronous network modeled as a directe...
Bhavani Shankar, Prasant Gopal, Kannan Srinathan, ...
ASE
2007
143views more  ASE 2007»
14 years 9 months ago
Composition inference for UML class diagrams
Knowing which associations are compositions is important in a tool for the reverse engineering of UML class diagrams. Firstly, recovery of composition relationships bridges the ga...
Ana Milanova
JIRS
2007
162views more  JIRS 2007»
14 years 9 months ago
Walking Control Algorithm of Biped Humanoid Robot on Uneven and Inclined Floor
This paper describes walking control algorithm for the stable walking of a biped humanoid robot on an uneven and inclined floor. Many walking control techniques have been develope...
Jung-Yup Kim, Ill-Woo Park, Jun-Ho Oh
MICRO
2010
IEEE
142views Hardware» more  MICRO 2010»
14 years 7 months ago
Virtual Snooping: Filtering Snoops in Virtualized Multi-cores
Virtualization has been rapidly expanding its applications in numerous server and desktop environments to improve the utilization and manageability of physical systems. Such prolif...
Daehoon Kim, Hwanju Kim, Jaehyuk Huh