Sciweavers

1056 search results - page 141 / 212
» Handbook of mathematical functions
Sort
View
HICSS
2002
IEEE
89views Biometrics» more  HICSS 2002»
15 years 5 months ago
Nash Strategies for Load Serving Entities in Dynamic Energy Multi-markets
In this paper the problem of developing bidding strategies for the participants of dynamic energy-multi markets is studied. Attention is given to strategic bidding of load serving...
Jose B. Cruz Jr., Ashkan Kian
144
Voted
ICNP
2002
IEEE
15 years 5 months ago
An Ultra-fast Shared Path Protection Scheme - Distributed Partial Information Management, Part II
— This paper describes a novel, ultra-fast heuristic algorithm to address an NP-hard optimization problem. One of its significances is that, for the first time, the paper shows...
Dahai Xu, Chunming Qiao, Yizhi Xiong
93
Voted
AI
2010
Springer
15 years 5 months ago
A Three-Way Decision Approach to Email Spam Filtering
Many classification techniques used for identifying spam emails, treat spam filtering as a binary classification problem. That is, the incoming email is either spam or non-spam....
Bing Zhou, Yiyu Yao, Jigang Luo
ARITH
1997
IEEE
15 years 4 months ago
On the Design of IEEE Compliant Floating Point Units
Engineering design methodology recommends designing a system as follows: Start with an unambiguous speci cation, partition the system into blocks, specify the functionality of eac...
Guy Even, Wolfgang J. Paul
115
Voted
FMCAD
2004
Springer
15 years 4 months ago
Bloom Filters in Probabilistic Verification
Abstract. Probabilistic techniques for verification of finite-state transition systems offer huge memory savings over deterministic techniques. The two leading probabilistic scheme...
Peter C. Dillinger, Panagiotis Manolios