• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 4,051
Next 10 →

Parallel discrete event simulation

by Richard M. Fujimoto , 1990
"... Parallel discrete event simulation (PDES), sometimes I called distributed simulation, refers to the execution of a single discrete event simulation program on a parallel computer. PDES has attracted a considerable amount of interest in recent years. From a pragmatic standpoint, this interest arises ..."
Abstract - Cited by 818 (39 self) - Add to MetaCart
from the fact that large simulations in engineering, computer science, economics, and military apphcations, to mention a few, consume enormous amounts of time

Fab: Content-based, collaborative recommendation

by Marko Balabanovic, Yoav Shoham - Communications of the ACM , 1997
"... Fab is a recommendation system designed to help users sift through the enormous amount of information available in the World Wide Web. Operational since Dec. 1994, this system combines the content-based and collaborative methods of recommendation in a way that exploits the advantages of the two appr ..."
Abstract - Cited by 682 (0 self) - Add to MetaCart
Fab is a recommendation system designed to help users sift through the enormous amount of information available in the World Wide Web. Operational since Dec. 1994, this system combines the content-based and collaborative methods of recommendation in a way that exploits the advantages of the two

The Role of Emotion in Believable Agents

by Joseph Bates - Communications of the ACM , 1994
"... Articial intelligence researchers attempting to create engaging apparently living creatures may nd important insight in the work of artists who have explored the idea of believable character In particular appropriately timed and clearly expressed emotion is a central requirement for believable ch ..."
Abstract - Cited by 557 (1 self) - Add to MetaCart
Articial intelligence researchers attempting to create engaging apparently living creatures may nd important insight in the work of artists who have explored the idea of believable character In particular appropriately timed and clearly expressed emotion is a central requirement for believable

Motivation through the Design of Work: Test of a Theory. Organizational Behavior and Human Performance,

by ] Richard Hackman , Grec R Oldham , 1976
"... A model is proposed that specifies the conditions under which individuals will become internally motivated to perform effectively on their jobs. The model focuses on the interaction among three classes of variables: (a) the psychological states of employees that must be present for internally motiv ..."
Abstract - Cited by 622 (2 self) - Add to MetaCart
such methodologies are developed, it will remain impractical to use activation theory in predicting or changing employee reactions to their jobs except in a very gross fashion; e.g., in situations where it is clear that most employees are enormously over-or understimulated by their jobs. A second problem has to do

Capacity Limits of MIMO Channels

by Andrea Goldsmith, Sriram Vishwanath, et al. - IEEE J. SELECT. AREAS COMMUN , 2003
"... We provide an overview of the extensive recent results on the Shannon capacity of single-user and multiuser multiple-input multiple-output (MIMO) channels. Although enormous capacity gains have been predicted for such channels, these predictions are based on somewhat unrealistic assumptions about t ..."
Abstract - Cited by 419 (17 self) - Add to MetaCart
We provide an overview of the extensive recent results on the Shannon capacity of single-user and multiuser multiple-input multiple-output (MIMO) channels. Although enormous capacity gains have been predicted for such channels, these predictions are based on somewhat unrealistic assumptions about

From theory to practice: an overview of MIMO space-time coded wireless systems

by David Gesbert, Mansoor Shafi, Da-shan Shiu, Peter J. Smith, Ayman Naguib - IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS , 2003
"... This paper presents an overview of recent progress in the area of multiple-input–multiple-output (MIMO) space–time coded wireless systems. After some background on the research leading to the discovery of the enormous potential of MIMO wireless links, we highlight the different classes of technique ..."
Abstract - Cited by 371 (6 self) - Add to MetaCart
This paper presents an overview of recent progress in the area of multiple-input–multiple-output (MIMO) space–time coded wireless systems. After some background on the research leading to the discovery of the enormous potential of MIMO wireless links, we highlight the different classes

Sizing Router Buffers

by Guido Appenzeller, Isaac Keslassy, Nick McKeown , 2004
"... All Internet routers contain buffers to hold packets during times of congestion. Today, the size of the buffers is determined by the dynamics of TCP’s congestion control algorithm. In particular, the goal is to make sure that when a link is congested, it is busy 100 % of the time; which is equivalen ..."
Abstract - Cited by 352 (17 self) - Add to MetaCart
All Internet routers contain buffers to hold packets during times of congestion. Today, the size of the buffers is determined by the dynamics of TCP’s congestion control algorithm. In particular, the goal is to make sure that when a link is congested, it is busy 100 % of the time; which

BYPASS THE LOOPS IN ENORMOUS NETWORKS

by D Kishore Kumar
"... ABSTRACT: In general comprehensive networks have chance of frequent failures; this can be failures of links between the routers when they communicate for the routing table which results in loop occurrence. Routers have the terrible feature of updating their routing tables where its convergence time ..."
Abstract - Add to MetaCart
ABSTRACT: In general comprehensive networks have chance of frequent failures; this can be failures of links between the routers when they communicate for the routing table which results in loop occurrence. Routers have the terrible feature of updating their routing tables where its convergence time

PETSc users manual

by Satish Balay, Kris Buschelman, Victor Eijkhout, Dinesh Kaushik, Matt Knepley, Lois Curfman Mcinnes, Barry Smith, Hong Zhang - ANL-95/11 - Revision 2.1.0, Argonne National Laboratory , 2001
"... tract W-31-109-Eng-38. 2 This manual describes the use of PETSc for the numerical solution of partial differential equations and related problems on high-performance computers. The Portable, Extensible Toolkit for Scientific Compu-tation (PETSc) is a suite of data structures and routines that provid ..."
Abstract - Cited by 282 (20 self) - Add to MetaCart
that provide the building blocks for the implemen-tation of large-scale application codes on parallel (and serial) computers. PETSc uses the MPI standard for all message-passing communication. PETSc includes an expanding suite of parallel linear, nonlinear equation solvers and time integrators that may be used

A progressive refinement approach to fast radiosity image generation

by Michael F. Cohen, Shenchang Eric Chen, John R. Wallace, Donald P. Greenberg - Computer Graphics , 1988
"... A reformulated radiosity algorithm is presented that produces initial images in time linear to the number of patches. The enormous memory costs of the radiosity algorithm are also elim-inated by computing form-factors on-the-fly. The technique is based on the approach of rendering by progressive ref ..."
Abstract - Cited by 266 (5 self) - Add to MetaCart
A reformulated radiosity algorithm is presented that produces initial images in time linear to the number of patches. The enormous memory costs of the radiosity algorithm are also elim-inated by computing form-factors on-the-fly. The technique is based on the approach of rendering by progressive
Next 10 →
Results 1 - 10 of 4,051
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University