Sciweavers

3356 search results - page 304 / 672
» Determining Consensus Numbers
Sort
View
CAV
2009
Springer
116views Hardware» more  CAV 2009»
16 years 4 months ago
Meta-analysis for Atomicity Violations under Nested Locking
Abstract. We study the problem of determining, given a run of a concurrent program, whether there is any alternate execution of it that violates atomicity, where atomicity is defin...
Azadeh Farzan, P. Madhusudan, Francesco Sorrentino
KDD
2005
ACM
104views Data Mining» more  KDD 2005»
16 years 4 months ago
Mining tree queries in a graph
We present an algorithm for mining tree-shaped patterns in a large graph. Novel about our class of patterns is that they can contain constants, and can contain existential nodes w...
Bart Goethals, Eveline Hoekx, Jan Van den Bussche
KDD
2005
ACM
92views Data Mining» more  KDD 2005»
16 years 4 months ago
Summarizing itemset patterns: a profile-based approach
Frequent-pattern mining has been studied extensively on scalable methods for mining various kinds of patterns including itemsets, sequences, and graphs. However, the bottleneck of...
Xifeng Yan, Hong Cheng, Jiawei Han, Dong Xin
VLSID
2002
IEEE
136views VLSI» more  VLSID 2002»
16 years 4 months ago
Buffered Routing Tree Construction under Buffer Placement Blockages
Interconnect delay has become a critical factor in determining the performance of integrated circuits. Routing and buffering are powerful means of improving the circuit speed and ...
Wei Chen, Massoud Pedram, Premal Buch
RECOMB
2008
Springer
16 years 4 months ago
Limitations of Pseudogenes in Identifying Gene Losses
The loss of previously established genes has been proposed as a major force in evolutionary change. While the sequencing of many new species offers the opportunity to identify case...
James C. Costello, Mira V. Han, Matthew W. Hahn