Software development teams exchange source code in shared repositories. These repositories are kept consistent by having developers follow a commit policy, such as "Program e...
Jan Wloka, Barbara G. Ryder, Frank Tip, Xiaoxia Re...
This study attempted to accurately segment tumors in mammograms. Although this task is considered to be a preprocessing step in a computer analysis program, it plays an important ...
Lisa Kinnard, Shih-Chung Ben Lo, Paul C. Wang, Mat...
form uses a notational abstractions called -functions. These instructions have no analogous in actual machine instruction sets, and they must be replaced by ordinary instructions ...
This paper presents a highly efficient processor design methodology based on the LISA 2.0 language. Typically the architecture design phase is dominated by an iterative processor ...
Andreas Hoffmann, Frank Fiedler, Achim Nohl, Suren...
We improve the approximation ratios for two optimization problems in planar graphs. For node-weighted Steiner tree, a classical network-optimization problem, the best achievable ap...
Erik D. Demaine, MohammadTaghi Hajiaghayi, Philip ...