Sciweavers

1723 search results - page 254 / 345
» Generalized file system dependencies
Sort
View
ICSE
2005
IEEE-ACM
15 years 10 months ago
An empirical study of fault localization for end-user programmers
End users develop more software than any other group of programmers, using software authoring devices such as e-mail filtering editors, by-demonstration macro builders, and spread...
Joseph R. Ruthruff, Margaret M. Burnett, Gregg Rot...
ICCD
2006
IEEE
121views Hardware» more  ICCD 2006»
15 years 7 months ago
Power/ground supply network optimization for power-gating
-- Power-gating is a technique for efficiently reducing leakage power by shutting off the idle blocks. However, the presence of power-gating may also introduce negative effects on ...
Hailin Jiang, Malgorzata Marek-Sadowska
ICCAD
2005
IEEE
98views Hardware» more  ICCAD 2005»
15 years 7 months ago
Clustering for processing rate optimization
Clustering (or partitioning) is a crucial step between logic synthesis and physical design in the layout of a large scale design. A design verified at the logic synthesis level m...
Chuan Lin, Jia Wang, Hai Zhou
PAKDD
2009
ACM
72views Data Mining» more  PAKDD 2009»
15 years 4 months ago
A Multi-resolution Approach for Atypical Behaviour Mining
Atypical behaviours are the basis of a valuable knowledge in domains related to security (e.g. fraud detection for credit card [1], cyber security [4] or safety of critical systems...
Alice Marascu, Florent Masseglia
ICASSP
2008
IEEE
15 years 4 months ago
Learning with noisy supervision for Spoken Language Understanding
Data-driven Spoken Language Understanding (SLU) systems need semantically annotated data which are expensive, time consuming and prone to human errors. Active learning has been su...
Christian Raymond, G. Riccardfi