Sciweavers

5948 search results - page 902 / 1190
» Computing Robust Counter-Strategies
Sort
View
IPPS
2008
IEEE
15 years 11 months ago
Improving software reliability and productivity via mining program source code
A software system interacts with third-party libraries through various APIs. Insufficient documentation and constant refactorings of third-party libraries make API library reuse ...
Tao Xie, Mithun Acharya, Suresh Thummalapenta, Kun...
IPPS
2008
IEEE
15 years 11 months ago
Scalable data dissemination using hybrid methods
Web server scalability can be greatly enhanced via hybrid data dissemination methods that use both unicast and multicast. Hybrid data dissemination is particularly promising due t...
Wenhui Zhang, Vincenzo Liberatore, Jonathan Beaver...
ISCAS
2008
IEEE
110views Hardware» more  ISCAS 2008»
15 years 11 months ago
Non-traditional irregular interconnects for massive scale SoC
— By using self-assembling fabrication techniques at the cellular, molecular, or atomic scale, it is nowadays possible to create functional assemblies in a mainly bottom-up way t...
Christof Teuscher, Anders A. Hansson
ISQED
2008
IEEE
101views Hardware» more  ISQED 2008»
15 years 11 months ago
Projection-Based Piecewise-Linear Response Surface Modeling for Strongly Nonlinear VLSI Performance Variations
Large-scale process fluctuations (particularly random device mismatches) at nanoscale technologies bring about highdimensional strongly nonlinear performance variations that canno...
Xin Li, Yu Cao
WACV
2008
IEEE
15 years 10 months ago
Object Categorization Based on Kernel Principal Component Analysis of Visual Words
In recent years, many researchers are studying object categorization problem. It is reported that bag of keypoints approach which is based on local features without topological in...
Kazuhiro Hotta