Sciweavers

10909 search results - page 250 / 2182
» Evaluating Backup Algorithms
Sort
View
ISM
2005
IEEE
159views Multimedia» more  ISM 2005»
15 years 10 months ago
Avatar-centric Risk Evaluation
Hazard detection and prevention of natural and manmade disasters at critical civil infrastructure is becoming increasingly important. Recent events, such as earthquakes and terror...
Maria-Cruz Villa-Uriol, Falko Kuester, Oscar Garc&...
ISPD
2005
ACM
153views Hardware» more  ISPD 2005»
15 years 10 months ago
Evaluation of placer suboptimality via zero-change netlist transformations
In this paper we introduce the concept of zero-change transformations to quantify the suboptimality of existing placers. Given a netlist and its placement from a placer, we formal...
Andrew B. Kahng, Sherief Reda
ATAL
2005
Springer
15 years 10 months ago
Evaluating the Minority Game strategy in agent role assignments
A team-based competitive environment is a complex multiagent environment, in which agents are required to coordinate with each other not only to enhance their collective behavior,...
Tingting Wang, Jiming Liu
CLEF
2005
Springer
15 years 10 months ago
Evaluating a Conceptual Indexing Method by Utilizing WordNet
This paper describes our participation to the English Girt Task of CLEF 2005 Campaign. A method for conceptual indexing based on WordNet is used. Both documents and queries are map...
Mustapha Baziz, Mohand Boughanem, Nathalie Aussena...
DOLAP
2004
ACM
15 years 10 months ago
Evaluating XML-extended OLAP queries based on a physical algebra
In today’s OLAP systems, integrating fast changing data, e.g., stock quotes, physically into a cube is complex and time-consuming. The widespread use of XML makes it very possib...
Xuepeng Yin, Torben Bach Pedersen