Sciweavers

7978 search results - page 1505 / 1596
» Combining shared-coin algorithms
Sort
View
OTM
2009
Springer
15 years 4 months ago
A Component Assignment Framework for Improved Capacity and Assured Performance in Web Portals
Abstract. Web portals hosting large-scale internet applications have become popular due to the variety of services they provide to their users. These portals are developed using co...
Nilabja Roy, Yuan Xue, Aniruddha S. Gokhale, Larry...
SAT
2009
Springer
117views Hardware» more  SAT 2009»
15 years 4 months ago
Dynamic Symmetry Breaking by Simulating Zykov Contraction
Abstract. We present a new method to break symmetry in graph coloring problems. While most alternative techniques add symmetry breaking predicates in a pre-processing step, we deve...
Bas Schaafsma, Marijn Heule, Hans van Maaren
SEMWEB
2009
Springer
15 years 4 months ago
RiMOM Results for OAEI 2009
In this report, we give a brief explanation of how RiMOM obtains the results at OAEI 2009 Campaign, especially in the new Instance Matching track. At first, we show the basic alig...
Xiao Zhang, Qian Zhong, Feng Shi, Juanzi Li, Jie T...
ISSTA
2009
ACM
15 years 4 months ago
Exception analysis and points-to analysis: better together
Exception analysis and points-to analysis are typically done in complete separation. Past algorithms for precise exception analysis (e.g., pairing throw clauses with catch stateme...
Martin Bravenboer, Yannis Smaragdakis
MM
2009
ACM
157views Multimedia» more  MM 2009»
15 years 4 months ago
Face image modeling by multilinear subspace analysis with missing values
The main difficulty in face image modeling is to decompose those semantic factors contributing to the formation of the face images, such as identity, illumination and pose. One p...
Xin Geng, Kate Smith-Miles, Zhi-Hua Zhou, Liang Wa...
« Prev « First page 1505 / 1596 Last » Next »