Sciweavers

211 search results - page 22 / 43
» An Automated Approach to Increasing the Robustness of C Libr...
Sort
View
GIS
2010
ACM
14 years 10 months ago
Exploiting local node cache in top-k queries within wireless sensor networks
Top-k queries are a popular type of query in Wireless Sensor Networks. Typical solutions rely on coordinated root-tonodes and nodes-to-root messages and on maintaining filters at...
Johannes Niedermayer, Mario A. Nascimento, Matthia...
DAC
2005
ACM
16 years 20 days ago
Enhanced leakage reduction Technique by gate replacement
Input vector control (IVC) technique utilizes the stack effect in CMOS circuit to apply the minimum leakage vector (MLV) to the circuit at the sleep mode to reduce leakage. Additi...
Lin Yuan, Gang Qu
MODELS
2007
Springer
15 years 5 months ago
Using Domain-Specific Modeling to Generate User Interfaces for Wizards
The rising adoption and incorporation of computers into everyday life requires human-computer interaction methods to be efficient and easy to understand. Simultaneously, complexit...
Enis Afgan, Jeffrey G. Gray, Purushotham Bangalore
AAAI
1997
15 years 1 months ago
Case-Based Similarity Assessment: Estimating Adaptability from Experience
Case-based problem-solving systems rely on similarity assessment to select stored cases whose solutions are easily adaptable to t current problems. However, widely-used similarity...
David B. Leake, Andrew Kinley, David C. Wilson
IPPS
2007
IEEE
15 years 6 months ago
Optimizing Sorting with Machine Learning Algorithms
The growing complexity of modern processors has made the development of highly efficient code increasingly difficult. Manually developing highly efficient code is usually expen...
Xiaoming Li, María Jesús Garzar&aacu...