• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 86,461
Next 10 →

Adaptive Strategy Design Pattern

by Olivier Aubert, Antoine Beugnard , 2001
"... According to a definition found in the summary of the Workshop on Adaptable and Adaptive Software[LL95]: “A program is called adaptive if it changes its behaviour automatically according to its context”. Within this context, we restrict our research domain to the automatic runtime adaptation of exis ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
of existing behaviours. In this paper, we propose an Adaptive Strategy Design Pattern that can be used to analyze or design self-adaptive systems. It makes the significant components usually involved in a self-adaptive system explicit, and studies their interactions. We show how the components participate

Business Strategy Design Patterns 23-May-04 1 Abstract Business Strategy Design Patterns

by unknown authors
"... This paper describes a small pattern language that re-interprets several wellknown business strategies in a pattern language form. The intention is to examine whether the pattern form can successfully be applied to business strategy concepts, and investigate whether pattern form can add to our under ..."
Abstract - Add to MetaCart
This paper describes a small pattern language that re-interprets several wellknown business strategies in a pattern language form. The intention is to examine whether the pattern form can successfully be applied to business strategy concepts, and investigate whether pattern form can add to our

Design of capacity-approaching irregular low-density parity-check codes

by Thomas J. Richardson, M. Amin Shokrollahi, Rüdiger L. Urbanke - IEEE TRANS. INFORM. THEORY , 2001
"... We design low-density parity-check (LDPC) codes that perform at rates extremely close to the Shannon capacity. The codes are built from highly irregular bipartite graphs with carefully chosen degree patterns on both sides. Our theoretical analysis of the codes is based on [1]. Assuming that the unde ..."
Abstract - Cited by 588 (6 self) - Add to MetaCart
We design low-density parity-check (LDPC) codes that perform at rates extremely close to the Shannon capacity. The codes are built from highly irregular bipartite graphs with carefully chosen degree patterns on both sides. Our theoretical analysis of the codes is based on [1]. Assuming

Statistical pattern recognition: A review

by Anil K. Jain, Robert P. W. Duin, Jianchang Mao - IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE , 2000
"... The primary goal of pattern recognition is supervised or unsupervised classification. Among the various frameworks in which pattern recognition has been traditionally formulated, the statistical approach has been most intensively studied and used in practice. More recently, neural network techniques ..."
Abstract - Cited by 1035 (30 self) - Add to MetaCart
techniques and methods imported from statistical learning theory have bean receiving increasing attention. The design of a recognition system requires careful attention to the following issues: definition of pattern classes, sensing environment, pattern representation, feature extraction and selection

Using the Strategy Design Pattern to Compose Reliable Distributed Protocols

by Benoit Garbinato, Rachid Guerraoui - USENIX CONFERENCE ON OBJECT-ORIENTED TECHNOLOGIES AND SYSTEMS , 1997
"... Reliable distributed systems involve many complex protocols. In this context, protocol composition is a central concept, because it allows the reuse of robust protocol implementations. In this paper, we describe how the Strategy pattern has been recursively used to support protocol composition in th ..."
Abstract - Cited by 19 (6 self) - Add to MetaCart
Reliable distributed systems involve many complex protocols. In this context, protocol composition is a central concept, because it allows the reuse of robust protocol implementations. In this paper, we describe how the Strategy pattern has been recursively used to support protocol composition

gSpan: Graph-Based Substructure Pattern Mining

by Xifeng Yan, Jiawei Han , 2002
"... We investigate new approaches for frequent graph-based pattern mining in graph datasets and propose a novel algorithm called gSpan (graph-based Substructure pattern mining) , which discovers frequent substructures without candidate generation. gSpan builds a new lexicographic order among graphs, and ..."
Abstract - Cited by 650 (34 self) - Add to MetaCart
We investigate new approaches for frequent graph-based pattern mining in graph datasets and propose a novel algorithm called gSpan (graph-based Substructure pattern mining) , which discovers frequent substructures without candidate generation. gSpan builds a new lexicographic order among graphs

Low-Power CMOS Digital Design

by Anantha P. Chandrakasan, Samuel Sheng, Robert W. Brodersen - JOURNAL OF SOLID-STATE CIRCUITS. VOL 27, NO 4. APRIL 1992 413 , 1992
"... Motivated by emerging battery-operated applications that demand intensive computation in portable environments, techniques are investigated which reduce power consumption in CMOS digital circuits while maintaining computational throughput. Techniques for low-power operation are shown which use the ..."
Abstract - Cited by 580 (20 self) - Add to MetaCart
the lowest possible supply voltage coupled with architectural, logic style, circuit, and technology optimizations. An architectural-based scaling strategy is presented which indicates that the optimum voltage is much lower than that determined by other scaling considerations. This optimum is achieved

Data Preparation for Mining World Wide Web Browsing Patterns

by Robert Cooley, Bamshad Mobasher, Jaideep Srivastava - KNOWLEDGE AND INFORMATION SYSTEMS , 1999
"... The World Wide Web (WWW) continues to grow at an astounding rate in both the sheer volume of tra#c and the size and complexity of Web sites. The complexity of tasks such as Web site design, Web server design, and of simply navigating through a Web site have increased along with this growth. An i ..."
Abstract - Cited by 567 (43 self) - Add to MetaCart
The World Wide Web (WWW) continues to grow at an astounding rate in both the sheer volume of tra#c and the size and complexity of Web sites. The complexity of tasks such as Web site design, Web server design, and of simply navigating through a Web site have increased along with this growth

13-Jun-04 1 Abstract Business Strategy Design Patterns

by unknown authors
"... This paper describes a small pattern language that re-interprets several well-known business strategies in a pattern language form. The intention is to examine whether the pattern form can successfully be applied to business strategy concepts, and investigate whether pattern form can add to our unde ..."
Abstract - Add to MetaCart
This paper describes a small pattern language that re-interprets several well-known business strategies in a pattern language form. The intention is to examine whether the pattern form can successfully be applied to business strategy concepts, and investigate whether pattern form can add to our

Licensed Under Creative Commons Attribution CC BY Strategy Design Pattern

by Renu Bala, Kapil Kumar Kaswan
"... Abstract: Design patterns usually describe abstract systems of interaction between classes, objects, and communication flows. So, a description of a set of interacting classes that provide a generalized solution framework to a generalized/specific design problem in a specific context can be said as ..."
Abstract - Add to MetaCart
this solution a million times over, without ever doing it the same way twice”. The solutions of the given problems are expressed in terms of objects and interfaces. Among 23 design patterns, Strategy pattern defines an interface common to all supported algorithms. Context uses this interface to call
Next 10 →
Results 1 - 10 of 86,461
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University