Sciweavers

1484 search results - page 159 / 297
» Ants meeting algorithms
Sort
View
83
Voted
POPL
2010
ACM
15 years 7 months ago
From Program Verification to Program Synthesis
This paper describes a novel technique for the synthesis of imperative programs. Automated program synthesis has the potential to make programming and the design of systems easier...
Saurabh Srivastava, Sumit Gulwani, Jeffrey S. Fost...
111
Voted
IWCMC
2010
ACM
15 years 3 months ago
Energy-aware online routing with QoS constraints in multi-rate wireless ad hoc networks
Wireless ad hoc networks consist of hundreds to thousands of mobile nodes that are powered by batteries. To prolong the network operational time, energy conservation in such netwo...
Wei Yang, Weifa Liang, Jun Luo, Wenhua Dou
91
Voted
ICIP
2003
IEEE
15 years 11 months ago
A Bayesian framework for Gaussian mixture background modeling
Background subtraction is an essential processing component for many video applications. However, its development has largely been application driven and done in ad hoc manners. I...
Dar-Shyang Lee, Jonathan J. Hull, Berna Erol
97
Voted
DAC
2006
ACM
15 years 11 months ago
Exploring trade-offs in buffer requirements and throughput constraints for synchronous dataflow graphs
Multimedia applications usually have throughput constraints. An implementation must meet these constraints, while it minimizes resource usage and energy consumption. The compute i...
Sander Stuijk, Marc Geilen, Twan Basten
WWW
2008
ACM
15 years 11 months ago
Identifying regional sensitive queries in web search
In Web search ranking, the expected results for some queries could vary greatly depending upon location of the user. We name such queries regional sensitive queries. Identifying r...
Srinivas Vadrevu, Ya Zhang, Belle L. Tseng, Gordon...