• No se han encontrado resultados

[PDF] Top 20 A Design of Automatic Visualizations for Divide-and-Conquer Algorithms

Has 10000 "A Design of Automatic Visualizations for Divide-and-Conquer Algorithms" found on our website. Below are the top 20 most common "A Design of Automatic Visualizations for Divide-and-Conquer Algorithms".

A Design of Automatic Visualizations for Divide-and-Conquer Algorithms

A Design of Automatic Visualizations for Divide-and-Conquer Algorithms

... sequence of visualizations of the data structure, displayed ...visualization of the array is displayed at the bottom of this ...visualization of the resulting subarray is ... See full document

8

Automatic design of Ant Colony Optimization
for permutation problems

Automatic design of Ant Colony Optimization for permutation problems

... behavior of our frame- work is similar to the current reference in the ...outcome of this first experiment was relatively clear: this confirmed that our framework was capable of generating high ... See full document

155

Automatic lateral control for unmanned vehicles via genetic algorithms

Automatic lateral control for unmanned vehicles via genetic algorithms

... McCormick, Simultaneous design of membership functions and rule sets for fuzzy controller using genetic algorithms, IEEE Transactions on Fuzzy Systems 3 (2) (1995) 129-139. Barro, Desi[r] ... See full document

7

Performance predictability of divide and conquer skeletons

Performance predictability of divide and conquer skeletons

... designed for parallel divide and conquer algorithms that provide hyper- cubical communications among processes The paper also introduces an accurate timing model designed for ... See full document

11

ODESeW. Automatic Generation of Knowledge Portals for Intranets and Extranets

ODESeW. Automatic Generation of Knowledge Portals for Intranets and Extranets

... developers and content (knowledge asset) providers versus Intranet and Extranet ...charged of developing the ontologies, which will be used by the content providers as a primary piece of ... See full document

31

On the Security of Cache Algorithms

On the Security of Cache Algorithms

... ministic and based on demand paging, ...results. For example, for miss-competitiveness it is known that randomized poli- cies [FKL + 91] achieve better bounds than those possible for determin- ... See full document

118

Competencias clave en asignaturas de carácter tecnológico: análisis de la situación actual y propuesta de mejora

Competencias clave en asignaturas de carácter tecnológico: análisis de la situación actual y propuesta de mejora

... España!y!Bélgica!tienen!un!porcentaje!muy!bajo!en!esta!competencia,!algo!que!resulta!llamativo!ya! que! en! la! descripción! de! sus! asignaturas! se! menciona! a! la! sociedad! como! parte! del! proceso! tecnológico,! ... See full document

70

Development of Efficient Techniques for the Analysis and Design of Antennas in Dual-Reflectarray Configuration

Development of Efficient Techniques for the Analysis and Design of Antennas in Dual-Reflectarray Configuration

... type of elements is made of elements of different size which adjust the phase shift generated by changing the resonant dimensions of the ...losses and the cross-polarization level with ... See full document

243

Book Close

Book Close

... it and inspired us by sharing their ideas in conversation; who generously shared information for the case studies; and who participated in the projects documented ... See full document

24

Two satellite based rainfall algorithms, calibration methods and post processing corrections applied to Mediterranean flood cases

Two satellite based rainfall algorithms, calibration methods and post processing corrections applied to Mediterranean flood cases

... sensors. For example; radar images can suffer from attenuation and calibration problems causing errors on the radar estimated ...radar and to study two different methodologies to get reliable radar ... See full document

187

A methodology for automatic ramp design in open pit mines

A methodology for automatic ramp design in open pit mines

... metodología de pits anidados divide este pit en varios otros más pequeños, a fin de dar sentido al concepto de pushback o incremento (Dagdelen 2001, Cacetta 2003). A partir de estos incrementos es que se procede a ... See full document

7

An immune system paradigm for the assurance of dependability of collaborative self-organizing systems

An immune system paradigm for the assurance of dependability of collaborative self-organizing systems

... comparison and voting services for the C nodes, including decision algorithms for N-version software executing on diverse processors ...response of the D node is assured by hardware ... See full document

6

Design and Validation of a Software Receiver for Galileo

Design and Validation of a Software Receiver for Galileo

... matrices of the capture carried out on 22/07/09 at 17.53 in Line of Sight ...captures and their PSDs showed high power interfering signals which made not possible the detection of the ... See full document

9

Applying CHC algorithms on radio network design for wireless communication

Applying CHC algorithms on radio network design for wireless communication

... performance of the proposed CHC Algorithms (QCHC-RM, QCHC-BCM, and QCHC-ILS) we additionally considered a set of GAs with dif- ferent crossover operators: one-point crossover (GA-OPX), ... See full document

10

Design and fabrication of grips for tensile tests

Design and fabrication of grips for tensile tests

... Drilling and chamfering required holes in the grip Milling machine Cutting the 2 jaws out of steel bar (50x15mm) Sewing machine Milling the 2 jaws till the required thickness (12mm) Milling machine Drilling ... See full document

52

TítuloTowards efficient exploitation of GPUs : a methodology for mapping index digit algorithms

TítuloTowards efficient exploitation of GPUs : a methodology for mapping index digit algorithms

... versions of known al- gorithms. Despite the required effort, this is one of the most common approaches for porting CPU applications to GPU when performance is ...critical. For instance, signal ... See full document

222

DESIGN AND OPTIMIZATION OF SOUND DIFFUSERS USING RBF-BASED SHAPES AND GENETIC ALGORITHMS

DESIGN AND OPTIMIZATION OF SOUND DIFFUSERS USING RBF-BASED SHAPES AND GENETIC ALGORITHMS

... optimization of diffusers’ design has been a topic of intense research in the last ...shapes of sound diffusion configurations, based on the use of radial basis functions ...definition ... See full document

10

TítuloUtilization of Blind Source Separation Algorithms for MIMO Linear Precoding

TítuloUtilization of Blind Source Separation Algorithms for MIMO Linear Precoding

... Utilization of Blind Source Separation Algorithms for MIMO Linear Precoding ??????????? ? ???? ?? ??? ?????????? ?????????? ?? ???? ?????? ????????? ????? ?? ??? ?? ??? ? ?? ??? ???????????? ?? ???? ?[.] ... See full document

8

Integrating defeasible argumentation and machine learning techniques . Preliminary report

Integrating defeasible argumentation and machine learning techniques . Preliminary report

... A and B, conflict (or attack) among arguments arises whenever A and B cannot be simultaneously accepted (typically because of some kind of logical ...Args of arguments obtained from a ... See full document

5

Design of application for graph's handling with heuristic algorithms of analysis

Design of application for graph's handling with heuristic algorithms of analysis

... c Tomamos próximo vértice de la pila, verificamos aristas que le faltan para completar grado, en este caso 2, en relación con las disponible, es decir 3, verificamos espacios disponibles[r] ... See full document

6

Show all 10000 documents...