Sciweavers

602 search results - page 52 / 121
» NetRaker suite: a demonstration
Sort
View
IJDE
2007
123views more  IJDE 2007»
14 years 10 months ago
Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile (SCAP) Method
Source code author identification deals with identifying the most likely author of a computer program, given a set of predefined author candidates. There are several scenarios whe...
Georgia Frantzeskou, Efstathios Stamatatos, Stefan...
IJRR
2010
186views more  IJRR 2010»
14 years 9 months ago
The Highly Adaptive SDM Hand: Design and Performance Evaluation
The inherent uncertainty associated with unstructured environments makes establishing a successful grasp difficult. Traditional approaches to this problem involve hands that are c...
Aaron M. Dollar, Robert D. Howe
SIGMOD
2011
ACM
242views Database» more  SIGMOD 2011»
14 years 1 months ago
The SystemT IDE: an integrated development environment for information extraction rules
Information Extraction (IE) — the problem of extracting structured information from unstructured text — has become the key enabler for many enterprise applications such as sem...
Laura Chiticariu, Vivian Chu, Sajib Dasgupta, Thil...
ISPD
2012
ACM
289views Hardware» more  ISPD 2012»
13 years 6 months ago
Keep it straight: teaching placement how to better handle designs with datapaths
As technology scales and frequency increases, a new design style is emerging, referred to as hybrid designs, which contain a mixture of random logic and datapath standard cell com...
Samuel I. Ward, Myung-Chul Kim, Natarajan Viswanat...
VEE
2012
ACM
322views Virtualization» more  VEE 2012»
13 years 6 months ago
Modeling virtualized applications using machine learning techniques
With the growing adoption of virtualized datacenters and cloud hosting services, the allocation and sizing of resources such as CPU, memory, and I/O bandwidth for virtual machines...
Sajib Kundu, Raju Rangaswami, Ajay Gulati, Ming Zh...