Sciweavers

1061 search results - page 145 / 213
» Integrity Constraints for Linked Data
Sort
View
TSE
2008
113views more  TSE 2008»
15 years 1 months ago
Discovering Neglected Conditions in Software by Mining Dependence Graphs
Neglected conditions are an important but difficult-to-find class of software defects. This paper presents a novel approach for revealing neglected conditions that integrates stati...
Ray-Yaung Chang, Andy Podgurski, Jiong Yang
ISPD
2010
ACM
195views Hardware» more  ISPD 2010»
15 years 8 months ago
Density gradient minimization with coupling-constrained dummy fill for CMP control
In the nanometer IC design, dummy fill is often performed to improve layout pattern uniformity and the post-CMP quality. However, filling dummies might greatly increase intercon...
Huang-Yu Chen, Szu-Jui Chou, Yao-Wen Chang
ERCIMDL
2006
Springer
155views Education» more  ERCIMDL 2006»
15 years 5 months ago
SIERRA - A Superimposed Application for Enhanced Image Description and Retrieval
In this demo proposal, we describe our prototype application, SIERRA, which combines text-based and content-based image retrieval and allows users to link together image content of...
Uma Murthy, Ricardo da Silva Torres, Edward A. Fox
TWC
2010
14 years 8 months ago
On the diversity order of non-orthogonal amplify-and-forward over block-fading channels
Abstract--In this paper, we deal with the performance of nonorthogonal Amplify-and-Forward protocols over block-fading channels (BFNAF), where the source retransmits the same data ...
Ioannis Krikidis, John S. Thompson, Steve McLaughl...
SIGMOD
2010
ACM
217views Database» more  SIGMOD 2010»
15 years 6 months ago
Mining knowledge from databases: an information network analysis approach
Most people consider a database is merely a data repository that supports data storage and retrieval. Actually, a database contains rich, inter-related, multi-typed data and infor...
Jiawei Han, Yizhou Sun, Xifeng Yan, Philip S. Yu