Sciweavers

10909 search results - page 198 / 2182
» Evaluating Backup Algorithms
Sort
View
MOC
1998
80views more  MOC 1998»
15 years 4 months ago
Fast evaluation of multiple zeta sums
We show that the multiple zeta sum: ζ(s1, s2, ..., sd) = n1>n2>...>nd 1 ns1 1 ns2 2 ...n sd d , for positive integers si with s1 > 1, can always be written as a finit...
Richard E. Crandall
IJSNET
2007
115views more  IJSNET 2007»
15 years 3 months ago
Implementation and performance evaluation of nanoMAC: a low-power MAC solution for high density wireless sensor networks
: This paper describes the implementation architecture and performance analysis of nanoMAC, a CSMA/CA based medium access control protocol, which is specifically designed for high...
Junaid Ansari, Janne Riihijärvi, Petri Mä...
GI
2009
Springer
15 years 2 months ago
Test your Strategy - Intuitive Strategy Definition and Evaluation for Novices and Experts
: ConnectIT uses a graphical representation to express strategies for playing the connect-four game. With this tool we can transfer complex knowledge about the connect-four game it...
Sven Jörges, Marco Bakera, Tiziana Margaria, ...
CORR
2010
Springer
146views Education» more  CORR 2010»
15 years 1 months ago
Multi-Criteria Evaluation of Partitioning Schemes for Real-Time Systems
In this paper we study the partitioning approach for multiprocessor real-time scheduling. This approach seems to be the easiest since, once the partitioning of the task set has be...
Irina Lupu, Pierre Courbin, Laurent George, Jo&eum...
ICFHR
2010
139views Biometrics» more  ICFHR 2010»
14 years 11 months ago
A Comparative Evaluation of Finger-Drawn Graphical Password Verification Methods
Abstract--Doodle-based graphical passwords represent a challenging scenario due to their high variability and the tendency to be graphically simple. Despite this, doodle-based auth...
Marcos Martinez-Diaz, C. Martin-Diaz, Javier Galba...