Sciweavers

1712 search results - page 90 / 343
» A Computational Approach to Binding Theory
Sort
View
WWW
2008
ACM
16 years 2 months ago
Trust-based recommendation systems: an axiomatic approach
High-quality, personalized recommendations are a key feature in many online systems. Since these systems often have explicit knowledge of social network structures, the recommenda...
Reid Andersen, Christian Borgs, Jennifer T. Chayes...
108
Voted
DAC
2005
ACM
16 years 2 months ago
Incremental exploration of the combined physical and behavioral design space
Achieving design closure is one of the biggest headaches for modern VLSI designers. This problem is exacerbated by high-level design automation tools that ignore increasingly impo...
Zhenyu (Peter) Gu, Jia Wang, Robert P. Dick, Hai Z...
SIBGRAPI
2006
IEEE
15 years 7 months ago
Duality between the Watershed by Image Foresting Transform and the Fuzzy Connectedness Segmentation Approaches
This paper makes a rereading of two successful image segmentation approaches, the fuzzy connectedness (FC) and the watershed (WS) approaches, by analyzing both by means of the Ima...
Romaric Audigier, Roberto de Alencar Lotufo
ICWMC
2006
IEEE
15 years 7 months ago
A Predictive Handoff Approach for Mobile IP
: We present a predictive handoff mechanism that can predict the occurrence of L2 handoff well. It can be used as a trigger for Mobile IP to start network layer handoff ahead exact...
Da-Wei Zhang, Yi Yao
FOSSACS
2004
Springer
15 years 7 months ago
Deriving Bisimulation Congruences in the DPO Approach to Graph Rewriting
Abstract. Motivated by recent work on the derivation of labelled transitions and bisimulation congruences from unlabelled reaction rules, we show how to solve this problem in the D...
Hartmut Ehrig, Barbara König