Sciweavers

2027 search results - page 186 / 406
» When is it best to best-respond
Sort
View
MOBIHOC
2009
ACM
16 years 1 months ago
Fine-grained boundary recognition in wireless ad hoc and sensor networks by topological methods
Location-free boundary recognition is crucial and critical for many fundamental network functionalities in wireless ad hoc and sensor networks. Previous designs, often coarse-grai...
Dezun Dong, Yunhao Liu, Xiangke Liao
KDD
2002
ACM
126views Data Mining» more  KDD 2002»
16 years 1 months ago
Integrating feature and instance selection for text classification
Instance selection and feature selection are two orthogonal methods for reducing the amount and complexity of data. Feature selection aims at the reduction of redundant features i...
Dimitris Fragoudis, Dimitris Meretakis, Spiros Lik...
CHI
2008
ACM
16 years 1 months ago
Towards designing a user-adaptive web-based e-learning system
This work-in-progress report presents the groundwork for the design of a user-adaptive web-based e-learning system. A survey and two randomized controlled experiments were carried...
Leena M. Razzaq, Neil T. Heffernan
VLSID
2007
IEEE
142views VLSI» more  VLSID 2007»
16 years 1 months ago
Controllability-driven Power Virus Generation for Digital Circuits
The problem of peak power estimation in CMOS circuits is essential for analyzing the reliability and performance of circuits at extreme conditions. The Power Virus problem involves...
K. Najeeb, Karthik Gururaj, V. Kamakoti, Vivekanan...
HPCA
2002
IEEE
16 years 1 months ago
Modeling Value Speculation
Several studies of speculative execution based on values have reported promising performance potential. However, virtually all microarchitectures in these studies were described i...
Yiannakis Sazeides