Sciweavers

963 search results - page 118 / 193
» Escape Analysis on Lists
Sort
View
109
Voted
ECSCW
2003
15 years 1 months ago
Applying Cyber-Archaeology
Online spaces that enable public shared inter-personal communications are of significant social and economic importance. This paper outlines a theoretical model and methodology, la...
Quentin Jones
SODA
2001
ACM
166views Algorithms» more  SODA 2001»
15 years 1 months ago
Better approximation algorithms for bin covering
Bin covering takes as input a list of items with sizes in (0 1) and places them into bins of unit demand so as to maximize the number of bins whose demand is satis ed. This is in ...
János Csirik, David S. Johnson, Claire Keny...
86
Voted
TREC
2007
15 years 1 months ago
Passage Relevancy Through Semantic Relatedness
Questions that require answers in the form of a list of entities and the identification of diverse biological entity classes present an interesting challenge that required new app...
Luis Tari, Phan Huy Tu, Barry Lumpkin, Robert Leam...
3DOR
2009
15 years 1 months ago
SHREC 2009 - Shape Retrieval Contest
The objective of the Shape Retrieval Contest '09 (SHREC'09) of Partial Models is to compare the performances of algorithms that accept a range image as the query and ret...
Remco C. Veltkamp, Frank B. ter Haar
105
Voted
AVI
2008
15 years 1 months ago
Visualizing program similarity in the Ac plagiarism detection system
Programming assignments are easy to plagiarize in such a way as to foil casual reading by graders. Graders can resort to automatic plagiarism detection systems, which can generate...
Manuel Freire