• Documents
  • Authors
  • Tables

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 8,444
Next 10 →

The SimpleScalar tool set, version 2.0

by Doug Burger, Todd M. Austin - Computer Architecture News , 1997
"... This report describes release 2.0 of the SimpleScalar tool set, a suite of free, publicly available simulation tools that offer both detailed and high-performance simulation of modern microprocessors. The new release offers more tools and capabilities, precompiled binaries, cleaner interfaces, bette ..."
Abstract - Cited by 1844 (43 self) - Add to MetaCart
, better documentation, easier installation, improved portability, and higher performance. This report contains a complete description of the tool set, including retrieval and installation instructions, a description of how to use the tools, a description of the target SimpleScalar architecture, and many

Some studies in machine learning using the game of Checkers

by Arthur L. Samuel - IBM JOURNAL OF RESEARCH AND DEVELOPMENT , 1959
"... Two machine-learning procedures have been investigated in some detail using the game of checkers. Enough work has been done to verify the fact that a computer can be programmed so that it will learn to play a better game of checkers than can be played by the person who wrote the program. Furthermor ..."
Abstract - Cited by 780 (0 self) - Add to MetaCart
. Furthermore, it can learn to do this in a remarkably short period of time (8 or 10 hours of machine-playing time) when given only the rules of the game, a sense of direction, and a redundant and incomplete list of parameters which are thought to have something to do with the game, but whose correct signs

Wide-Area Traffic: The Failure of Poisson Modeling

by Vern Paxson, Sally Floyd - IEEE/ACM TRANSACTIONS ON NETWORKING , 1995
"... Network arrivals are often modeled as Poisson processes for analytic simplicity, even though a number of traffic studies have shown that packet interarrivals are not exponentially distributed. We evaluate 24 wide-area traces, investigating a number of wide-area TCP arrival processes (session and con ..."
Abstract - Cited by 1775 (24 self) - Add to MetaCart
with fixed hourly rates, but that other connection arrivals deviate considerably from Poisson; that modeling TELNET packet interarrivals as exponential grievously underestimates the burstiness of TELNET traffic, but using the empirical Tcplib [Danzig et al, 1992] interarrivals preserves burstiness over many

Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software

by James Newsome, Dawn Song - In Network and Distributed Systems Security Symposium , 2005
"... Software vulnerabilities have had a devastating effect on the Internet. Worms such as CodeRed and Slammer can compromise hundreds of thousands of hosts within hours or even minutes, and cause millions of dollars of damage [32, 51]. To successfully combat these fast automatic Internet attacks, we nee ..."
Abstract - Cited by 647 (32 self) - Add to MetaCart
Software vulnerabilities have had a devastating effect on the Internet. Worms such as CodeRed and Slammer can compromise hundreds of thousands of hosts within hours or even minutes, and cause millions of dollars of damage [32, 51]. To successfully combat these fast automatic Internet attacks, we

The Future of Personnel Economics

by Edward P. Lazear - IZA EUROPEAN SUMMER SYMPOSIUM IN LABOUR ECONOMICS , 1999
"... Personnel economics has grown over the past twenty years to become a major branch of labor economics. Beginning primarily as a theoretical field, recent empirical analyses have provided support for earlier theories. Personnel economics is distinguished from traditional personnel analysis in that it ..."
Abstract - Cited by 246 (6 self) - Add to MetaCart
in that it is economics. As such, personnel economists assume maximizing agents, invoke the concept of equilibrium, and focus on economic efficiency. Although much has been learned, many important questions remain. For example, are worker wage profiles dependent on individual attributes or is the firm more important

A Measurement Study of Vehicular Internet Access Using

by Vladimir Bychkovsky, Bret Hull, Allen Miu, Hari Balakrishnan, Samuel Madden - In Situ Wi-Fi Networks. In 12th ACM MOBICOM Conf , 2006
"... The impressive penetration of 802.11-based wireless networks in many metropolitan areas around the world offers, for the first time, the opportunity of a “grassroots ” wireless Internet service provided by users who “open up ” their 802.11 (Wi-Fi) access points in a controlled manner to mobile clien ..."
Abstract - Cited by 197 (6 self) - Add to MetaCart
The impressive penetration of 802.11-based wireless networks in many metropolitan areas around the world offers, for the first time, the opportunity of a “grassroots ” wireless Internet service provided by users who “open up ” their 802.11 (Wi-Fi) access points in a controlled manner to mobile

Mariposa: A Wide-Area Distributed Database System

by Michael Stonebraker, Paul M. Aoki, Witold Litwin, Avi Pfeffer, Adam Sah, Jeff Sidell, Carl Staelin, Andrew Yu - VLDB Journal , 1996
"... Abstract. The requirements of wide-area distributed database systems differ dramatically from those of local-area network systems. In a wide-area network (WAN) configuration, individual sites usually report to different system administrators, have different access and charging algorithms, install si ..."
Abstract - Cited by 198 (8 self) - Add to MetaCart
site-specific data type extensions, and have different constraints on servicing remote requests. Typical of the last point are production transaction environments, which are fully engaged during normal business hours, and cannot take on additional load. Finally, there may be many sites participating

Behavioral theories and the neurophysiology of reward,

by Wolfram Schultz - Annu. Rev. Psychol. , 2006
"... ■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories that can ..."
Abstract - Cited by 187 (0 self) - Add to MetaCart
of the infrastructure over a 24-hour day, by avoiding long queues during prime daytime hours and inactive periods during the wee hours of the night. A proper pricing structure known in advance to the captains of the barges will shape their decisions to enter the locks at a moment that is economically most appropriate

Corrective feedback and learner uptake: Negotiation of form in communicative classroom.

by Roy Lyster , Leila Ranta , Dawn Allen , Linda Corliss , Yakov Goldstein , Randall Halter , Thierry Karsenti , Lyne Laganière , Tamara Loring , Nina Padden , James Poirier , Nicole Sabourin - Studies in Second Language Acquisition, , 1997
"... This article presents a study of corrective feedback and learner uptake (i.e., responses to feedback) in four immersion classrooms at the primary level. Transcripts totaling 18.3 hours of classroom interaction taken from 14 subject-matter lessons and 13 French language arts lessons were analyzed us ..."
Abstract - Cited by 173 (6 self) - Add to MetaCart
This article presents a study of corrective feedback and learner uptake (i.e., responses to feedback) in four immersion classrooms at the primary level. Transcripts totaling 18.3 hours of classroom interaction taken from 14 subject-matter lessons and 13 French language arts lessons were analyzed

Knowledge-based Training of Artificial Neural Networks for Autonomous Robot Driving

by Dean A. Pomerleau , 1993
"... Many real world problems quirea degree of flexibility that is to achieve using hand algorithms. One such domain is vision-based autonomous driving. In this task, the dual challenges of a constantly changing environment coupled with a real processing constrain the flexibility and of a machine le ..."
Abstract - Cited by 162 (13 self) - Add to MetaCart
Many real world problems quirea degree of flexibility that is to achieve using hand algorithms. One such domain is vision-based autonomous driving. In this task, the dual challenges of a constantly changing environment coupled with a real processing constrain the flexibility and of a machine
Next 10 →
Results 1 - 10 of 8,444
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University