Sciweavers

7006 search results - page 1315 / 1402
» Approximation Algorithms
Sort
View
SDM
2007
SIAM
131views Data Mining» more  SDM 2007»
15 years 2 months ago
Load Shedding in Classifying Multi-Source Streaming Data: A Bayes Risk Approach
In many applications, we monitor data obtained from multiple streaming sources for collective decision making. The task presents several challenges. First, data in sensor networks...
Yijian Bai, Haixun Wang, Carlo Zaniolo
199
Voted
POPL
2005
ACM
16 years 1 months ago
Synthesis of interface specifications for Java classes
While a typical software component has a clearly specified (static) interface in terms of the methods and the input/output types they support, information about the correct sequen...
P. Madhusudan, Pavol Cerný, Rajeev Alur, Wo...
107
Voted
USENIX
1994
15 years 2 months ago
A Better Update Policy
y-filled data block results in a delayed write,Abstract while a modification that fills a block results in an immediate, although asynchronous, write. TheSome file systems can dela...
Jeffrey C. Mogul
JGTOOLS
2008
151views more  JGTOOLS 2008»
15 years 22 days ago
GPU Color Constancy
A sensor located inside a digital camera is only able to measure the light which is reflected by an object. The reflected light varies with the spectral power distribution of the ...
Marc Ebner
222
Voted
MAM
2011
349views Communications» more  MAM 2011»
14 years 7 months ago
An iterative logarithmic multiplier
The paper presents a new multiplier enabling achievement of an arbitrary accuracy. It follows the same idea of number representation as the Mitchell’s algorithm, but does not use...
Zdenka Babic, Aleksej Avramovic, Patricio Bulic
« Prev « First page 1315 / 1402 Last » Next »