Sciweavers

2774 search results - page 114 / 555
» Exploiting Deep Structure
Sort
View
95
Voted
IEAAIE
2005
Springer
15 years 8 months ago
Ontology-Based Natural Language Parser for E-Marketplaces
We propose an approach to Natural Language Processing exploiting knowledge domain in an e-commerce scenario. Based on such modeling an NLP parser is presented, aimed at translating...
Stefano Coppi, Tommaso Di Noia, Eugenio Di Sciasci...
154
Voted
IPPS
1999
IEEE
15 years 6 months ago
A Graph Based Framework to Detect Optimal Memory Layouts for Improving Data Locality
In order to extract high levels of performance from modern parallel architectures, the effective management of deep memory hierarchies is very important. While architectural advan...
Mahmut T. Kandemir, Alok N. Choudhary, J. Ramanuja...
110
Voted
SIGMETRICS
1992
ACM
128views Hardware» more  SIGMETRICS 1992»
15 years 6 months ago
MemSpy: Analyzing Memory System Bottlenecks in Programs
To cope with the increasing difference between processor and main memory speeds, modern computer systems use deep memory hierarchies. In the presence of such hierarchies, the perf...
Margaret Martonosi, Anoop Gupta, Thomas E. Anderso...
126
Voted
MTV
2006
IEEE
138views Hardware» more  MTV 2006»
15 years 8 months ago
Advanced SAT-Techniques for Bounded Model Checking of Blackbox Designs
In this paper we will present an optimized structural 01X-SAT-solver for bounded model checking of blackbox designs that exploits semantical knowledge regarding the node selection...
Marc Herbstritt, Bernd Becker, Christoph Scholl
111
Voted
INFFUS
2008
119views more  INFFUS 2008»
15 years 2 months ago
A scalable correlation aware aggregation strategy for wireless sensor networks
Sensors-to-sink data in wireless sensor networks (WSNs) are typically correlated with each other. Exploiting such correlation when performing data aggregation can result in consid...
Yujie Zhu, Ramanuja Vedantham, Seung-Jong Park, Ra...