Sciweavers

8068 search results - page 1513 / 1614
» Java Data Objects
Sort
View
ICDE
2007
IEEE
148views Database» more  ICDE 2007»
15 years 11 months ago
Efficient Detection of Distributed Constraint Violations
In many distributed environments, the primary function of monitoring software is to detect anomalies, that is, instances when system behavior deviates substantially from the norm....
Shipra Agrawal, Supratim Deb, K. V. M. Naidu, Raje...
VIS
2004
IEEE
222views Visualization» more  VIS 2004»
15 years 11 months ago
Non-Linear Model Fitting to Parameterize Diseased Blood Vessels
Accurate estimation of vessel parameters is a prerequisite for automated visualization and analysis of healthy and diseased blood vessels. The objective of this research is to est...
Alexandra La Cruz, Matús Straka, Arnold K&o...
GIS
2007
ACM
15 years 11 months ago
Smugglers and border guards: the GeoStar project at RPI
We present the GeoStar project at RPI, which researches various terrain (i.e., elevation) representations and operations thereon. This work is motivated by the large amounts of hi...
W. Randolph Franklin, Metin Inanc, Zhongyi Xie, Da...
GIS
2009
ACM
15 years 11 months ago
Map-Matching for Low-Sampling-Rate GPS Trajectories
Map-matching is the process of aligning a sequence of observed user positions with the road network on a digital map. It is a fundamental pre-processing step for many applications...
Yin Lou, Chengyang Zhang, Yu Zheng, Xing Xie, Wei ...
DAC
2005
ACM
15 years 10 months ago
Memory access optimization through combined code scheduling, memory allocation, and array binding in embedded system design
In many of embedded systems, particularly for those with high data computations, the delay of memory access is one of the major bottlenecks in the system's performance. It ha...
Jungeun Kim, Taewhan Kim
« Prev « First page 1513 / 1614 Last » Next »