Sciweavers

17951 search results - page 3431 / 3591
» Network Coding Applications
Sort
View
ICCAD
2006
IEEE
190views Hardware» more  ICCAD 2006»
15 years 11 months ago
Factor cuts
Enumeration of bounded size cuts is an important step in several logic synthesis algorithms such as technology mapping and re-writing. The standard algorithm does not scale beyond...
Satrajit Chatterjee, Alan Mishchenko, Robert K. Br...
WWW
2010
ACM
15 years 9 months ago
Collaborative location and activity recommendations with GPS history data
With the increasing popularity of location-based services, such as tour guide and location-based social network, we now have accumulated many location data on the Web. In this pap...
Vincent Wenchen Zheng, Yu Zheng, Xing Xie, Qiang Y...
123
Voted
WWW
2010
ACM
15 years 9 months ago
Not so creepy crawler: easy crawler generation with standard xml queries
Web crawlers are increasingly used for focused tasks such as the extraction of data from Wikipedia or the analysis of social networks like last.fm. In these cases, pages are far m...
Franziska von dem Bussche, Klara A. Weiand, Benedi...
PERCOM
2009
ACM
15 years 9 months ago
NoShake: Content Stabilization for Shaking Screens of Mobile Devices
—Consumer electronics and mobile devices intended for pervasive applications are often subject to shaking that makes their screen difficult to read. To address this usability cha...
Ahmad Rahmati, Clayton Shepard, Lin Zhong
SPAA
2009
ACM
15 years 9 months ago
Distributed algorithms for QoS load balancing
We consider a dynamic load balancing scenario in which users allocate resources in a non-cooperative and selfish fashion. The perceived performance of a resource for a user decre...
Heiner Ackermann, Simon Fischer, Martin Hoefer, Ma...
« Prev « First page 3431 / 3591 Last » Next »