Sciweavers

1740 search results - page 279 / 348
» A Digital Archive of Research Papers in Computer Science
Sort
View
CF
2004
ACM
15 years 5 months ago
Reducing traffic generated by conflict misses in caches
Off-chip memory accesses are a major source of power consumption in embedded processors. In order to reduce the amount of traffic between the processor and the off-chip memory as ...
Pepijn J. de Langen, Ben H. H. Juurlink
IPSN
2010
Springer
15 years 3 months ago
Adaptive IEEE 802.15.4 protocol for energy efficient, reliable and timely communications
The IEEE 802.15.4 standard for wireless sensor networks can support energy efficient, reliable, and timely packet transmission by tuning the medium access control parameters macMi...
Pan Gun Park, Carlo Fischione, Karl Henrik Johanss...
126
Voted
SAC
2010
ACM
15 years 8 months ago
Background knowledge in formal concept analysis: constraints via closure operators
The aim of this short paper is to present a general method of using background knowledge to impose constraints in conceptual clustering of object-attribute relational data. The pr...
Radim Belohlávek, Vilém Vychodil
STOC
2010
ACM
199views Algorithms» more  STOC 2010»
15 years 6 months ago
Zero-One Frequency Laws
Data streams emerged as a critical model for multiple applications that handle vast amounts of data. One of the most influential and celebrated papers in streaming is the “AMSâ...
Vladimir Braverman and Rafail Ostrovsky
SIGUCCS
2000
ACM
15 years 6 months ago
Assessing the Benefit of In-House Work Experience for University Students
The Department of Management Studies, (DOMS) has had a Computer Laboratory for a decade. DOMS IT environment has become increasingly complex. From having less than 20 standalone P...
Karen Shackleford