Sciweavers

6770 search results - page 429 / 1354
» How GPUs Work
Sort
View
INFOCOM
2009
IEEE
15 years 11 months ago
Throughput-Delay Tradeoffs in Large-Scale MANETs with Network Coding
—This paper characterizes the throughput-delay tradeoffs in mobile ad hoc networks (MANETs) with network coding, and compares results in the situation where only replication and ...
Chi Zhang, Yuguang Fang, Xiaoyan Zhu
IWPC
2009
IEEE
15 years 11 months ago
Resumption strategies for interrupted programming tasks
Interruptions are a daily reality for professional programmers. Unfortunately, the strategies programmers use to recover lost knowledge and resume work have not yet been well stud...
Chris Parnin, Spencer Rugaber
AIME
2009
Springer
15 years 11 months ago
Analysing Clinical Guidelines' Contents with Deontic and Rhetorical Structures
The computerisation of clinical guidelines can greatly benefit from the automatic analysis of their content using Natural Language Processing techniques. Because of the central rol...
Gersende Georg, Hugo Hernault, Marc Cavazza, Helmu...
AIMS
2009
Springer
15 years 11 months ago
Scalable Detection and Isolation of Phishing
Abstract. This paper presents a proposal for scalable detection and isolation of phishing. The main ideas are to move the protection from end users towards the network provider and...
Giovane C. M. Moura, Aiko Pras
APPROX
2009
Springer
129views Algorithms» more  APPROX 2009»
15 years 11 months ago
Baum's Algorithm Learns Intersections of Halfspaces with Respect to Log-Concave Distributions
In 1990, E. Baum gave an elegant polynomial-time algorithm for learning the intersection of two origin-centered halfspaces with respect to any symmetric distribution (i.e., any D s...
Adam R. Klivans, Philip M. Long, Alex K. Tang