Sciweavers

5675 search results - page 112 / 1135
» Exploiting Chaos for Computation
Sort
View
120
Voted
CASES
2005
ACM
15 years 2 months ago
Exploiting pipelining to relax register-file port constraints of instruction-set extensions
Customisable embedded processors are becoming available on the market, thus making it possible for designers to speed up execution of applications by using Application-specific F...
Laura Pozzi, Paolo Ienne
ACL
2006
15 years 2 months ago
An Effective Two-Stage Model for Exploiting Non-Local Dependencies in Named Entity Recognition
This paper shows that a simple two-stage approach to handle non-local dependencies in Named Entity Recognition (NER) can outperform existing approaches that handle non-local depen...
Vijay Krishnan, Christopher D. Manning
121
Voted
DEXAW
2010
IEEE
181views Database» more  DEXAW 2010»
15 years 1 months ago
Towards a Search System for the Web Exploiting Spatial Data of a Web Document
In this paper, we describe our work in progress in the scope of information retrieval exploiting the spatial data extracted from web documents. We discuss problems of a search for ...
Stefan Dlugolinsky, Michal Laclavik, Ladislav Hluc...
92
Voted
BMCBI
2007
130views more  BMCBI 2007»
15 years 28 days ago
Exploiting residue-level and profile-level interface propensities for usage in binding sites prediction of proteins
Background: Recognition of binding sites in proteins is a direct computational approach to the characterization of proteins in terms of biological and biochemical function. Residu...
Qiwen Dong, Xiaolong Wang, Lei Lin, Yi Guan
SIGMETRICS
2008
ACM
142views Hardware» more  SIGMETRICS 2008»
15 years 22 days ago
Exploiting manufacturing variations for compensating environment-induced clock drift in time synchronization
Time synchronization is an essential service in distributed computing and control systems. It is used to enable tasks such as synchronized data sampling and accurate time-offlight...
Thomas Schmid, Zainul Charbiwala, Jonathan Friedma...