Sciweavers

144227 search results - page 28597 / 28846
» Using the
Sort
View
IOR
2010
75views more  IOR 2010»
15 years 2 months ago
Confronting Entrenched Insurgents
During counterinsurgency operations, government forces with superior …repower confront weaker lowsignature insurgents. Under what conditions should government (Blue) forces atta...
Edward H. Kaplan, Moshe Kress, Roberto Szechtman
IOR
2010
84views more  IOR 2010»
15 years 2 months ago
Lumpy Capacity Investment and Disinvestment Dynamics
Capacity addition and withdrawal decisions are among the most important strategic decisions made by …rms in oligopolistic industries. In this paper, we develop and analyze a ful...
David Besanko, Ulrich Doraszelski, Lauren Xiaoyuan...
IS
2010
15 years 2 months ago
Tree pattern mining with tree automata constraints
Most work on pattern mining focuses on simple data structures such as itemsets and sequences of itemsets. However, a lot of recent applications dealing with complex data like chem...
Sandra de Amo, Nyara A. Silva, Ronaldo P. Silva, F...
ISCA
2010
IEEE
232views Hardware» more  ISCA 2010»
15 years 2 months ago
Evolution of thread-level parallelism in desktop applications
As the effective limits of frequency and instruction level parallelism have been reached, the strategy of microprocessor vendors has changed to increase the number of processing ...
Geoffrey Blake, Ronald G. Dreslinski, Trevor N. Mu...
RSA
2008
80views more  RSA 2008»
15 years 2 months ago
The persistent-access-caching algorithm
ABSTRACT: Caching is widely recognized as an effective mechanism for improving the performance of the World Wide Web. One of the key components in engineering the Web caching syste...
Predrag R. Jelenkovic, Ana Radovanovic
« Prev « First page 28597 / 28846 Last » Next »