Sciweavers

8468 search results - page 1442 / 1694
» The Technology of Data Stashing
Sort
View
KES
1998
Springer
15 years 3 months ago
An acquisition of the relation between vision and action using self-organizing map and reinforcement learning
An agent must acquire internal representation appropriate for its task, environment, sensors. As a learning algorithm, reinforcement learning is often utilized to acquire the rela...
Kazunori Terada, Hideaki Takeda, Toyoaki Nishida
85
Voted
HPCA
1997
IEEE
15 years 3 months ago
ATM and Fast Ethernet Network Interfaces for User-Level Communication
Fast Ethernet and ATM are two attractive network technologies for interconnecting workstation clusters for parallel and distributed computing. This paper compares network interfac...
Matt Welsh, Anindya Basu, Thorsten von Eicken
ICCCN
1997
IEEE
15 years 3 months ago
Time dependent priority scheduling for guaranteed QoS systems
With the advances in server technology, and the advent of fast Gigabit networks, it has become possible to support multi-media applications. To support the requirements for the tr...
Shailender Chaudhry, Alok N. Choudhary
ICDCS
1997
IEEE
15 years 3 months ago
Effect of Connection Rerouting on Application Performance in Mobile Networks
—The increasing deployment of wireless access technology, along with the emergence of high speed integrated service networks, such as ATM, promises to provide mobile users with u...
Partho Pratim Mishra, Mani B. Srivastava
121
Voted
CAISE
1997
Springer
15 years 3 months ago
Towards Method-Driven Trace Capture
Abstract: Traceability is a prerequisite for managing the evolution of (software) systems. Assuring overall traceability of a system development process, i.e., capturing and interr...
Klaus Pohl, Ralf Dömges, Matthias Jarke
« Prev « First page 1442 / 1694 Last » Next »