Sciweavers

17770 search results - page 3308 / 3554
» A Generalization of Forward-Backward Algorithm
Sort
View
124
Voted
ISSTA
2009
ACM
15 years 10 months ago
HAMPI: a solver for string constraints
Many automatic testing, analysis, and verification techniques for programs can be effectively reduced to a constraint-generation phase followed by a constraint-solving phase. Th...
Adam Kiezun, Vijay Ganesh, Philip J. Guo, Pieter H...
139
Voted
ISSTA
2009
ACM
15 years 10 months ago
Advanced code coverage analysis using substring holes
Code coverage is a common aid in the testing process. It is generally used for marking the source code segments that were executed and, more importantly, those that were not execu...
Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pel...
144
Voted
IWCMC
2009
ACM
15 years 10 months ago
Multiple-antenna multiple-relay system with precoding for multiuser transmission
Multi-hop relaying will play a central role in next generation wireless systems. In this paper a novel relaying strategy that uses multiple-input multiple-output (MIMO) relays in ...
Arash Talebi, Witold A. Krzymien
137
Voted
JCDL
2009
ACM
139views Education» more  JCDL 2009»
15 years 10 months ago
Topic model methods for automatically identifying out-of-scope resources
Recent years have seen the rise of subject-themed digital libraries, such as the NSDL pathways and the Digital Library for Earth System Education (DLESE). These libraries often ne...
Steven Bethard, Soumya Ghosh, James H. Martin, Tam...
113
Voted
LANC
2009
ACM
158views Education» more  LANC 2009»
15 years 10 months ago
Enhancements to the opinion model for video-telephony applications
In this paper, we show how the proposed model in ITU-T Recommendation G.1070 “Opinion model for video-telephony applications” cannot model properly the perceptual video qualit...
Jose Joskowicz, José Carlos López-Ar...
« Prev « First page 3308 / 3554 Last » Next »