Sciweavers

16404 search results - page 3276 / 3281
» A set coverage problem
Sort
View
130
Voted
ICDAR
2011
IEEE
13 years 12 months ago
Subgraph Spotting through Explicit Graph Embedding: An Application to Content Spotting in Graphic Document Images
—We present a method for spotting a subgraph in a graph repository. Subgraph spotting is a very interesting research problem for various application domains where the use of a re...
Muhammad Muzzamil Luqman, Jean-Yves Ramel, Josep L...
SMA
2009
ACM
132views Solid Modeling» more  SMA 2009»
15 years 6 months ago
Robust Voronoi-based curvature and feature estimation
Many algorithms for shape analysis and shape processing rely on accurate estimates of differential information such as normals and curvature. In most settings, however, care must...
Quentin Mérigot, Maks Ovsjanikov, Leonidas ...
205
Voted
ASPDAC
2012
ACM
334views Hardware» more  ASPDAC 2012»
13 years 8 months ago
GreenDroid: An architecture for the Dark Silicon Age
— The Dark Silicon Age kicked off with the transition to multicore and will be characterized by a wild chase for seemingly ever-more insane architectural designs. At the heart o...
Nathan Goulding-Hotta, Jack Sampson, Qiaoshi Zheng...
VEE
2012
ACM
239views Virtualization» more  VEE 2012»
13 years 8 months ago
Transparent dynamic instrumentation
Process virtualization provides a virtual execution environment within which an unmodified application can be monitored and controlled while it executes. The provided layer of co...
Derek Bruening, Qin Zhao, Saman P. Amarasinghe
111
Voted
WSDM
2012
ACM
254views Data Mining» more  WSDM 2012»
13 years 8 months ago
Maximizing product adoption in social networks
One of the key objectives of viral marketing is to identify a small set of users in a social network, who when convinced to adopt a product will influence others in the network l...
Smriti Bhagat, Amit Goyal 0002, Laks V. S. Lakshma...
« Prev « First page 3276 / 3281 Last » Next »