Sciweavers

7065 search results - page 1230 / 1413
» Iterative Scheduling Algorithms
Sort
View
ISVC
2005
Springer
15 years 10 months ago
Structural and Textural Skeletons for Noisy Shapes
The extraction of consistent skeletons in the presence of boundary noise is still a problem for most skeletonization algorithms. Many suppress skeletons associated with boundary pe...
Wooi-Boon Goh, Kai-Yun Chan
PKDD
2005
Springer
122views Data Mining» more  PKDD 2005»
15 years 10 months ago
A Probabilistic Clustering-Projection Model for Discrete Data
For discrete co-occurrence data like documents and words, calculating optimal projections and clustering are two different but related tasks. The goal of projection is to find a ...
Shipeng Yu, Kai Yu, Volker Tresp, Hans-Peter Krieg...
ACMMSP
2004
ACM
101views Hardware» more  ACMMSP 2004»
15 years 10 months ago
Metrics and models for reordering transformations
Irregular applications frequently exhibit poor performance on contemporary computer architectures, in large part because of their inefficient use of the memory hierarchy. Runtime ...
Michelle Mills Strout, Paul D. Hovland
SIGCSE
2004
ACM
99views Education» more  SIGCSE 2004»
15 years 10 months ago
Java IO and testing made simple
We present software tools that support robust input processing and comprehensive testing in Java. The software includes the JPT library that supports error-checked typed input via...
Viera K. Proulx, Richard Rasala
CAAN
2004
Springer
15 years 10 months ago
Bandwidth Allocation in Networks: A Single Dual Update Subroutine for Multiple Objectives
We study the bandwidth allocation problem Maximize U(x), subject to Ax ≤ c; x ≥ 0 where U is a utility function, x is a bandwidth allocation vector, and Ax ≤ c represent the...
Sung-woo Cho, Ashish Goel
« Prev « First page 1230 / 1413 Last » Next »