Sciweavers

55 search results - page 6 / 11
» Compact dictionaries for variable-length keys and data with ...
Sort
View
INFOCOM
2006
IEEE
15 years 3 months ago
Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications
— A key function for network traffic monitoring and analysis is the ability to perform aggregate queries over multiple data streams. Change detection is an important primitive w...
Robert T. Schweller, Zhichun Li, Yan Chen, Yan Gao...
CASES
2006
ACM
15 years 3 months ago
Adaptive object code compression
Previous object code compression schemes have employed static and semiadaptive compression algorithms to reduce the size of instruction memory in embedded systems. The suggestion ...
John Gilbert, David M. Abrahamson
CERA
2007
67views more  CERA 2007»
14 years 9 months ago
Engineered-to-order Approach for Providing Flexibility in e-Commerce of Mold Parts
: In the mold parts industry, customers typically place orders for order-made parts with some changes to the design specifications of ready-made parts within the extent of the manu...
Duhwan Mun, Kwangsub Jang, Soonhung Han, Junhwan K...
SIAMCO
2008
108views more  SIAMCO 2008»
14 years 9 months ago
A Viability Theorem for Morphological Inclusions
The aim of this paper is to adapt the Viability Theorem from differential inclusions (governing the evolution of vectors in a finite dimensional space) to so-called morphological i...
Thomas Lorenz
SIAMSC
2008
167views more  SIAMSC 2008»
14 years 9 months ago
Low-Dimensional Polytope Approximation and Its Applications to Nonnegative Matrix Factorization
In this study, nonnegative matrix factorization is recast as the problem of approximating a polytope on the probability simplex by another polytope with fewer facets. Working on th...
Moody T. Chu, Matthew M. Lin