Sciweavers

1982 search results - page 317 / 397
» Designing Efficient Distributed Algorithms Using Sampling Te...
Sort
View
148
Voted
ISPD
2010
ACM
224views Hardware» more  ISPD 2010»
15 years 9 months ago
An analytical placer for mixed-size 3D placement
Existing 3D placement techniques are mainly used for standardcell circuits, while mixed-size placement is needed to support highlevel functional units and intellectual property (I...
Jason Cong, Guojie Luo
152
Voted
MEDIAFORENSICS
2010
15 years 4 months ago
Forensic hash for multimedia information
Digital multimedia such as images and videos are prevalent on today's internet and cause significant social impact, which can be evidenced by the proliferation of social netw...
Wenjun Lu, Avinash L. Varna, Min Wu
101
Voted
KDD
2009
ACM
189views Data Mining» more  KDD 2009»
15 years 9 months ago
CoCo: coding cost for parameter-free outlier detection
How can we automatically spot all outstanding observations in a data set? This question arises in a large variety of applications, e.g. in economy, biology and medicine. Existing ...
Christian Böhm, Katrin Haegler, Nikola S. M&u...
229
Voted
ICDE
2006
IEEE
178views Database» more  ICDE 2006»
16 years 3 months ago
Characterizing and Exploiting Reference Locality in Data Stream Applications
In this paper, we investigate a new approach to process queries in data stream applications. We show that reference locality characteristics of data streams could be exploited in ...
Feifei Li, Ching Chang, George Kollios, Azer Besta...
130
Voted
IWCMC
2010
ACM
15 years 4 months ago
Decentralized service composition in pervasive computing environments
In a pervasive computing environment, the devices are embedded in the physical world, providing services and interconnected by a communication network. Composition of these servic...
Joanna Izabela Siebert, Jiannong Cao, Long Cheng, ...