Algorithm

Results: 17634



#Item
981Sparse Predicated Global Value Numbering  A Sparse Algorithm for 1. Introduction

Sparse Predicated Global Value Numbering A Sparse Algorithm for 1. Introduction

Add to Reading List

Source URL: www.sable.mcgill.ca

Language: English - Date: 2009-03-09 09:18:33
982Joint Power Control and Scheduling Algorithm for Wi-Fi Ad-hoc Networks Sangho Oh∗ , Marco Gruteser∗ , Daniel Jiang† , Qi Chen† ∗ WINLAB,  Rutgers University, NJ, USA

Joint Power Control and Scheduling Algorithm for Wi-Fi Ad-hoc Networks Sangho Oh∗ , Marco Gruteser∗ , Daniel Jiang† , Qi Chen† ∗ WINLAB, Rutgers University, NJ, USA

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2011-08-05 21:34:24
983.  CS711008Z Algorithm Design and Analysis Lecture 5. Basic algorithm design technique: Divide-and-Conquer 1

. CS711008Z Algorithm Design and Analysis Lecture 5. Basic algorithm design technique: Divide-and-Conquer 1

Add to Reading List

Source URL: bioinfo.ict.ac.cn

Language: English - Date: 2016-03-29 21:49:55
984Despite the popularity and superior performance of Gaussian-kernel support vector machine (SVM), the two hyperparameters sigma (scale) and C (tradeoff) remain hard to be tuned. Many techniques have been developed to addr

Despite the popularity and superior performance of Gaussian-kernel support vector machine (SVM), the two hyperparameters sigma (scale) and C (tradeoff) remain hard to be tuned. Many techniques have been developed to addr

Add to Reading List

Source URL: mmds-data.org

Language: English - Date: 2016-06-23 15:50:48
985CM proofs for elliptic curves over number elds Stephen Enright•Ward Für meine Lieblingsdeutschlehrerin.

CM proofs for elliptic curves over number elds Stephen Enright•Ward Für meine Lieblingsdeutschlehrerin.

Add to Reading List

Source URL: iml.univ-mrs.fr

Language: English - Date: 2014-09-16 07:05:16
986DE GRUYTER OLDENBOURG  it – Information Technology 2014; Galley Proof Self-Portrayals of GI Junior Fellows Dominik Schultes*

DE GRUYTER OLDENBOURG it – Information Technology 2014; Galley Proof Self-Portrayals of GI Junior Fellows Dominik Schultes*

Add to Reading List

Source URL: junior-fellows.gi.de

Language: English - Date: 2016-04-04 11:41:13
987Black-Box Complexity—A Complexity Theory for Evolutionary Computation ´ Presenter: Benjamin Doerr, Ecole Polytechnique de Paris, France; email .

Black-Box Complexity—A Complexity Theory for Evolutionary Computation ´ Presenter: Benjamin Doerr, Ecole Polytechnique de Paris, France; email .

Add to Reading List

Source URL: www.conference123.org

Language: English - Date: 2014-07-16 23:22:02
988Introduction  Detecting and removing apparent singularities Application to ODEs The rational algorithm Conclusion Removing Apparent Singularities of Linear Differential Systems with Rational Function Coefficients

Introduction Detecting and removing apparent singularities Application to ODEs The rational algorithm Conclusion Removing Apparent Singularities of Linear Differential Systems with Rational Function Coefficients

Add to Reading List

Source URL: www.issac-symposium.org

Language: English - Date: 2015-07-08 08:52:26
9891  A Randomized Multi-modulo RNS Architecture for Double-and-Add in ECC to prevent Power Analysis Side Channel Attacks Jude Angelo Ambrose†

1 A Randomized Multi-modulo RNS Architecture for Double-and-Add in ECC to prevent Power Analysis Side Channel Attacks Jude Angelo Ambrose†

Add to Reading List

Source URL: www.inesc-id.pt

Language: English - Date: 2013-12-23 08:24:26
990Hidden Markov Models: All the Glorious Gory Details Noah A. Smith Department of Computer Science Johns Hopkins University

Hidden Markov Models: All the Glorious Gory Details Noah A. Smith Department of Computer Science Johns Hopkins University

Add to Reading List

Source URL: homes.cs.washington.edu

Language: English - Date: 2015-07-30 17:51:19