Sciweavers

1262 search results - page 196 / 253
» Generating instruction sets and microarchitectures from appl...
Sort
View
CORR
2000
Springer
149views Education» more  CORR 2000»
14 years 9 months ago
On The Closest String and Substring Problems
Abstract. The problem of finding a center string that is "close" to every given string arises in computational molecular biology and coding theory. This problem has two v...
Ming Li, Bin Ma, Lusheng Wang
PODS
2006
ACM
137views Database» more  PODS 2006»
15 years 10 months ago
Data exchange: computing cores in polynomial time
Data exchange deals with inserting data from one database into another database having a different schema. We study and solve a central computational problem of data exchange, nam...
Georg Gottlob, Alan Nash
ISSTA
2009
ACM
15 years 4 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...
ICC
2007
IEEE
212views Communications» more  ICC 2007»
15 years 4 months ago
Middleware Vertical Handoff Manager: A Neural Network-Based Solution
— – Major research challenges in the next generation of wireless networks include the provisioning of worldwide seamless mobility across heterogeneous wireless networks, the im...
Nidal Nasser, Sghaier Guizani, Eyhab Al-Masri
ECAI
2000
Springer
15 years 2 months ago
Achieving Coordination through Combining Joint Planning and Joint Learning
There are two major approaches to activity coordination in multiagent systems. First, by endowing the agents with the capability to jointly plan, that is, to jointly generate hypot...
Gerhard Weiss