Sciweavers

1368 search results - page 106 / 274
» Perfect Local Computability and Computable Simulations
Sort
View
ISAAC
2005
Springer
153views Algorithms» more  ISAAC 2005»
15 years 5 months ago
Network Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
EURODAC
1994
IEEE
127views VHDL» more  EURODAC 1994»
15 years 3 months ago
Optimal equivalent circuits for interconnect delay calculations using moments
In performance-driven interconnect design, delay estimators are used to determine both the topology and the layout of good routing trees. We address the class of moment-matching, ...
Sudhakar Muddu, Andrew B. Kahng
AE
2005
Springer
15 years 5 months ago
Memetic Algorithms for the MinLA Problem
This paper presents a new Memetic Algorithm designed to compute near optimal solutions for the MinLA problem. It incorporates a highly specialized crossover operator, a fast MinLA ...
Eduardo Rodriguez-Tello, Jin-Kao Hao, Jose Torres-...
92
Voted
ACTA
2006
108views more  ACTA 2006»
14 years 11 months ago
Refinement verification of the lazy caching algorithm
The lazy caching algorithm of Afek, Brown, and Merrit (1993) is a protocol that allows the use of local caches with delayed updates. It results in a memory model that is not atomi...
Wim H. Hesselink
ICIP
2005
IEEE
16 years 1 months ago
A likelihood function for block-based motion analysis
In this paper, the computation of likelihood of block motion candidates is considered. The method is based on the evaluation of the sum of squared differences (SSD) measure for lo...
Janne Heikkilä, Olli Silvén, Pekka San...