Sciweavers

9425 search results - page 1695 / 1885
» Some Notes on Models and Modelling
Sort
View
132
Voted
SIMUTOOLS
2008
15 years 5 months ago
Simulating SMEPP middleware
Embedded Peer-to-Peer Systems (EP2P) represent a new challenge in the development of software for distributed systems. The main objective of the SMEPP (Secure Middleware for Embed...
Javier Barbarán, Carlos Bonilla, Jose &Aacu...
142
Voted
NIPS
2007
15 years 5 months ago
Locality and low-dimensions in the prediction of natural experience from fMRI
Functional Magnetic Resonance Imaging (fMRI) provides dynamical access into the complex functioning of the human brain, detailing the hemodynamic activity of thousands of voxels d...
Francois Meyer, Greg Stephens
141
Voted
SODA
2008
ACM
110views Algorithms» more  SODA 2008»
15 years 5 months ago
Why simple hash functions work: exploiting the entropy in a data stream
Hashing is fundamental to many algorithms and data structures widely used in practice. For theoretical analysis of hashing, there have been two main approaches. First, one can ass...
Michael Mitzenmacher, Salil P. Vadhan
141
Voted
SODA
2008
ACM
126views Algorithms» more  SODA 2008»
15 years 5 months ago
On distributing symmetric streaming computations
A common approach for dealing with large data sets is to stream over the input in one pass, and perform computations using sublinear resources. For truly massive data sets, howeve...
Jon Feldman, S. Muthukrishnan, Anastasios Sidiropo...
CSREAEEE
2006
145views Business» more  CSREAEEE 2006»
15 years 5 months ago
e-Business Systems: Exploring Knowledge Prospect Domains (KPDs)
Research was conducted in the area of sustainable knowledge extraction from e-business systems and technologies. Differentiating approaches from three notable authors in the field...
Daniel Botha
« Prev « First page 1695 / 1885 Last » Next »