Sciweavers

2779 search results - page 497 / 556
» Modelling Immunological Memory
Sort
View
95
Voted
ENTCS
2002
145views more  ENTCS 2002»
15 years 14 days ago
Combining Monitors for Runtime System Verification
Runtime verification permits checking system properties that cannot be fully verified off-line. This is particularly true when the system includes complex third-party components, ...
Joshua Levy, Hassen Saïdi, Tomás E. Ur...
94
Voted
CORR
1998
Springer
82views Education» more  CORR 1998»
15 years 10 days ago
Name Strategy: Its Existence and Implications
It is argued that colour name strategy, object name strategy, and chunking strategy in memory are all aspects of the same general phenomena, called stereotyping, and this in turn ...
Mark D. Roberts
JMLR
2002
133views more  JMLR 2002»
15 years 10 days ago
Learning Precise Timing with LSTM Recurrent Networks
The temporal distance between events conveys information essential for numerous sequential tasks such as motor control and rhythm detection. While Hidden Markov Models tend to ign...
Felix A. Gers, Nicol N. Schraudolph, Jürgen S...
132
Voted
SIGPLAN
1998
15 years 9 days ago
Unloading Java Classes That Contain Static Fields
In Java the de nition of a \program" is a bit fuzzy. A Java applet is essentially a Java application (i.e. program) that can be executed by a Java enabled Web browser (i.e. a...
Charles E. McDowell, Elizabeth A. Baldwin
85
Voted
TPDS
1998
98views more  TPDS 1998»
15 years 9 days ago
A Basic-Cycle Calculation Technique for Efficient Dynamic Data Redistribution
—Array redistribution is usually required to enhance algorithm performance in many parallel programs on distributed memory multicomputers. Since it is performed at run-time, ther...
Yeh-Ching Chung, Ching-Hsien Hsu, Sheng-Wen Bai