Sciweavers

11436 search results - page 2045 / 2288
» Modeling Real Reasoning
Sort
View
132
Voted
JMLR
2006
80views more  JMLR 2006»
15 years 3 months ago
Using Machine Learning to Guide Architecture Simulation
An essential step in designing a new computer architecture is the careful examination of different design options. It is critical that computer architects have efficient means by ...
Greg Hamerly, Erez Perelman, Jeremy Lau, Brad Cald...
JNW
2006
149views more  JNW 2006»
15 years 3 months ago
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes
Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications because of its specialty of instant establishment. However, the securit...
Shidi Xu, Yi Mu, Willy Susilo
114
Voted
JPDC
2006
112views more  JPDC 2006»
15 years 3 months ago
CEFT: A cost-effective, fault-tolerant parallel virtual file system
The vulnerability of computer nodes due to component failures is a critical issue for cluster-based file systems. This paper studies the development and deployment of mirroring in...
Yifeng Zhu, Hong Jiang
132
Voted
JTAER
2006
109views more  JTAER 2006»
15 years 3 months ago
Shopping Online or Not? Cognition and Personality Matters
E-commerce has brought both opportunities and challenges to Internet marketers. One challenge facing the marketers is to "convert" Internet users who are reluctant to bu...
Sophia Wang, Simon Wang, Ming T. Wang
MVA
2008
201views Computer Vision» more  MVA 2008»
15 years 3 months ago
How close are we to solving the problem of automated visual surveillance?
The problem of automated visual surveillance has spawned a lively research area, with 2005 seeing three conferences or workshops and special issues of two major journals devoted to...
Hannah M. Dee, Sergio A. Velastin
« Prev « First page 2045 / 2288 Last » Next »