Sciweavers

134 search results - page 11 / 27
» Experimental analysis of privacy loss in DCOP algorithms
Sort
View
103
Voted
OOPSLA
1999
Springer
15 years 1 months ago
Compositional Pointer and Escape Analysis for Java Programs
This paper presents a combined pointer and escape analysis algorithm for Java programs. The algorithm is based on the abstraction of points-to escape graphs, which characterize ho...
John Whaley, Martin C. Rinard
93
Voted
SIGIR
2009
ACM
15 years 4 months ago
Incorporating prior knowledge into a transductive ranking algorithm for multi-document summarization
This paper presents a transductive approach to learn ranking functions for extractive multi-document summarization. At the first stage, the proposed approach identifies topic th...
Massih-Reza Amini, Nicolas Usunier
ISPD
1998
ACM
99views Hardware» more  ISPD 1998»
15 years 1 months ago
New efficient algorithms for computing effective capacitance
We describe a novel iterationless approach for computing the effective capacitance of an interconnect load at a driving gate output. Our new approach is considerably faster than p...
Andrew B. Kahng, Sudhakar Muddu
74
Voted
IADIS
2004
14 years 11 months ago
Collaborative Task Scheduling Method Based on Social Network Analysis for Cellphone Application
This paper proposes a collaborative approach for personal task management which is modeled as an alliance model. Alliance model is based on information sharing and collaboration o...
Ikki Ohmukai, Hideaki Takeda
CVPR
2010
IEEE
14 years 8 months ago
Cost-Sensitive Subspace Learning for Face Recognition
Conventional subspace learning-based face recognition aims to attain low recognition errors and assumes same loss from all misclassifications. In many real-world face recognition...
Jiwen Lu, Tan Yap-Peng