Sciweavers

2304 search results - page 338 / 461
» On the Vulnerability of Large Graphs
Sort
View
FQAS
2000
Springer
80views Database» more  FQAS 2000»
15 years 1 months ago
A Knowledge Scout for Discovering Medical Patterns: Methodology and System SCAMP
Knowledge scouts are software agents that autonomously synthesize knowledge of interest to a given user (target knowledge) by applying inductive database operators to a local or di...
Kenneth A. Kaufman, Ryszard S. Michalski
DAC
1995
ACM
15 years 1 months ago
Register Allocation and Binding for Low Power
This paper describes a technique for calculating the switching activity of a set of registers shared by di erent data values. Based on the assumption that the joint pdf (probabili...
Jui-Ming Chang, Massoud Pedram
IPPS
1995
IEEE
15 years 1 months ago
Performance evaluation of a new parallel preconditioner
The linear systems associated with large, sparse, symmetric, positive definite matrices are often solved iteratively using the preconditioned conjugate gradient method. We have d...
Keith D. Gremban, Gary L. Miller, Marco Zagha
IAT
2009
IEEE
15 years 1 months ago
Developing a Deterministic Patrolling Strategy for Security Agents
Abstract—Developing autonomous systems that patrol environments for detecting intruders is a topic of increasing relevance in security applications. An important aspect of these ...
Nicola Basilico, Nicola Gatti, Francesco Amigoni
AVI
2008
15 years 9 days ago
Visualizing antenna design spaces
This paper describes a long-term project exploring advanced visual interfaces for antenna design. MERL developed three successive prototypes that embodied an evolution towards lar...
Kent Wittenburg, Tom Lanning, Darren Leigh, Kathy ...