Sciweavers

5675 search results - page 85 / 1135
» Exploiting Chaos for Computation
Sort
View
AB
2007
Springer
15 years 4 months ago
Manifestation and Exploitation of Invariants in Bioinformatics
Whenever a programmer writes a loop, or a mathematician does a proof by induction, an invariant is involved. The discovery and understanding of invariants often underlies problem s...
Limsoon Wong
PVM
2007
Springer
15 years 4 months ago
Using CMT in SCTP-Based MPI to Exploit Multiple Interfaces in Cluster Nodes
Many existing clusters use inexpensive Gigabit Ethernet and often have multiple interfaces cards to improve bandwidth and enhance fault tolerance. We investigate the use of Concurr...
Brad Penoff, Mike Tsai, Janardhan R. Iyengar, Alan...
ACII
2005
Springer
15 years 3 months ago
Physiological Sensing and Feature Extraction for Emotion Recognition by Exploiting Acupuncture Spots
Previous emotion recognition systems have mainly focused on pattern classification, rather than utilizing sensing technologies or feature extraction methods. This paper introduces ...
Ahyoung Choi, Woontack Woo
MM
2004
ACM
124views Multimedia» more  MM 2004»
15 years 3 months ago
Exploiting content-based networking for video streaming
This technical demonstration shows that content-based networking is a promising technology for multireceiver video streaming. Each video receiver is provided with fine grained se...
Viktor S. Wold Eide, Frank Eliassen, Jørgen...
AP2PC
2004
Springer
15 years 3 months ago
On Exploiting Agent Technology in the Design of Peer-to-Peer Applications
Abstract. Peer-to-peer (P2P) architectures exhibit attractive properties for a wide range of real world systems. As a result they are increasingly being applied in the design of ap...
Steven Willmott, Josep M. Pujol, Ulises Cort&eacut...