Sciweavers

728 search results - page 3 / 146
» A Method for Performing an Exhaustive Evaluation of RDF(S) I...
Sort
View
MICRO
1999
IEEE
102views Hardware» more  MICRO 1999»
13 years 10 months ago
Evaluation of a High Performance Code Compression Method
Compressing the instructions of an embedded program is important for cost-sensitive low-power control-oriented embedded computing. A number of compression schemes have been propos...
Charles Lefurgy, Eva Piccininni, Trevor N. Mudge
PIMRC
2010
IEEE
13 years 3 months ago
Euclidean distance decomposition to generate new 16-QAM and 64-QAM space-time trellis codes
In this paper, the generation of 16-QAM and 64-QAM space-time trellis codes (STTCs) for several transmit antennas is considered. The main problem with an exhaustive search is the i...
Pierre Viland, Gheorghe Zaharia, Jean-Franç...
COLING
2010
13 years 24 days ago
Automatic analysis of semantic similarity in comparable text through syntactic tree matching
We propose to analyse semantic similarity in comparable text by matching syntactic trees and labeling the alignments according to one of five semantic similarity relations. We pre...
Erwin Marsi, Emiel Krahmer
LDTA
2010
13 years 6 months ago
Faster ambiguity detection by grammar filtering
Real programming languages are often defined using ambiguous context-free grammars. Some ambiguity is intentional while other ambiguity is accidental. A good grammar development e...
H. J. S. Basten, Jurgen J. Vinju
WCNC
2008
IEEE
14 years 5 days ago
Characterizing Link Importance in Multi-Channel, Multi-Radio, Multi-Rate Wireless Mesh Networks
Abstract— Modern day wireless networks are increasingly supporting various civilian applications that require high bandwidth for successful operation. In such cases, it is import...
Ranjan Pal, Chen-Nee Chuah