Sciweavers

579 search results - page 98 / 116
» Optimal Dynamic Video-on-Demand Using Adaptive Broadcasting
Sort
View
90
Voted
PODC
2003
ACM
15 years 5 months ago
Routing networks for distributed hash tables
Routing topologies for distributed hashing in peer-to-peer networks are classified into two categories: deterministic and randomized. A general technique for constructing determi...
Gurmeet Singh Manku
GECCO
2003
Springer
15 years 5 months ago
A Case for Codons in Evolutionary Algorithms
A new method is developed for representation and encoding in population-based evolutionary algorithms. The method is inspired by the biological genetic code and utilizes a many-to-...
Joshua Gilbert, Margaret J. Eppstein
AH
2000
Springer
15 years 4 months ago
A Connectionist Approach for Supporting Personalized Learning in a Web-Based Learning Environment
The paper investigates the use of computational intelligence for adaptive lesson presentation in a Web-based learning environment. A specialized connectionist architecture is devel...
Kyparisia A. Papanikolaou, George D. Magoulas, Mar...
ISCAS
1999
IEEE
300views Hardware» more  ISCAS 1999»
15 years 4 months ago
Ripple correlation control, with some applications
Ripple correlation control is a nonlinear control approach applicable to power electronic circuits. It makes use of voltage, current, or power ripple and correlates this with swit...
P. T. Krein
JIT
1999
Springer
123views Database» more  JIT 1999»
15 years 4 months ago
Byte Code Engineering
The term “Java” is used to denote two different concepts: the language itself and the related execution environment, the Java Virtual Machine (JVM), which executes byte code in...
Markus Dahm