Sciweavers

897 search results - page 71 / 180
» Identity: How to name it, How to find it
Sort
View
VLSID
2004
IEEE
117views VLSI» more  VLSID 2004»
16 years 2 months ago
Evaluating the Reliability of Defect-Tolerant Architectures for Nanotechnology with Probabilistic Model Checking
As we move from deep submicron technology to nanotechnology for device manufacture, the need for defect-tolerant architectures is gaining importance. This is because, at the nanos...
Gethin Norman, David Parker, Marta Z. Kwiatkowska,...
EDBT
2008
ACM
159views Database» more  EDBT 2008»
16 years 1 months ago
Automaton in or out: run-time plan optimization for XML stream processing
Many systems such as Tukwila and YFilter combine automaton and algebra techniques to process queries over tokenized XML streams. Typically in this architecture, an automaton is fi...
Hong Su, Elke A. Rundensteiner, Murali Mani
CHI
2007
ACM
15 years 5 months ago
A familiar face(book): profile elements as signals in an online social network
Using data from a popular online social network site, this paper explores the relationship between profile structure (namely, which fields are completed) and number of friends, gi...
Cliff Lampe, Nicole Ellison, Charles Steinfield
CSCLP
2006
Springer
15 years 5 months ago
An Attempt to Dynamically Break Symmetries in the Social Golfers Problem
A number of different satisfaction and optimisation combinatorial problems have recently been approached with constraint programming over the domain of finite sets, for increased d...
Francisco Azevedo
COLING
2008
15 years 3 months ago
Computer Aided Correction and Extension of a Syntactic Wide-Coverage Lexicon
The effectiveness of parsers based on manually created resources, namely a grammar and a lexicon, rely mostly on the quality of these resources. Thus, increasing the parser covera...
Lionel Nicolas, Benoît Sagot, Miguel A. Moli...