Sciweavers

6770 search results - page 400 / 1354
» How GPUs Work
Sort
View
EJIS
2007
87views more  EJIS 2007»
15 years 4 months ago
Identifying healthcare actors involved in the adoption of information systems
The adoption of information systems in healthcare is no less significant than in any other commercial or caring organisation. The literature on IS adoption in healthcare, makes it...
Vasiliki Mantzana, Marinos Themistocleous, Zahir I...
NECO
2008
108views more  NECO 2008»
15 years 4 months ago
Optimal Approximation of Signal Priors
In signal restoration by Bayesian inference, one typically uses a parametric model of the prior distribution of the signal. Here, we consider how the parameters of a prior model s...
Aapo Hyvärinen
SIGIR
2008
ACM
15 years 4 months ago
Evaluation over thousands of queries
Information retrieval evaluation has typically been performed over several dozen queries, each judged to near-completeness. There has been a great deal of recent work on evaluatio...
Ben Carterette, Virgiliu Pavlu, Evangelos Kanoulas...
AI
2005
Springer
15 years 4 months ago
Constraint-based reasoning and privacy/efficiency tradeoffs in multi-agent problem solving
Because of privacy concerns, agents may not want to reveal information that could be of use in problem solving. As a result, there are potentially important tradeoffs between main...
Richard J. Wallace, Eugene C. Freuder
IJSN
2007
73views more  IJSN 2007»
15 years 4 months ago
Optimal worm-scanning method using vulnerable-host distributions
: Most Internet worms use random scanning. The distribution of vulnerable hosts on the Internet, however, is highly non-uniform over the IP-address space. This implies that random ...
Zesheng Chen, Chuanyi Ji