Sciweavers

5109 search results - page 820 / 1022
» On Learning Limiting Programs
Sort
View

Source Code
2890views
17 years 10 days ago
ImageJ
"ImageJ can display, edit, analyze, process, save, and print 8-bit, 16-bit and 32-bit images. It can read many image formats including TIFF, PNG, GIF, JPEG, BMP, DICOM, FITS, ...
National Institute of Health
CVPR
2008
IEEE
16 years 6 months ago
Robust tensor factorization using R1 norm
Over the years, many tensor based algorithms, e.g. two dimensional principle component analysis (2DPCA), two dimensional singular value decomposition (2DSVD), high order SVD, have...
Heng Huang, Chris H. Q. Ding
312
Voted
ICDE
2005
IEEE
260views Database» more  ICDE 2005»
16 years 5 months ago
A Comparative Evaluation of Transparent Scaling Techniques for Dynamic Content Servers
We study several transparent techniques for scaling dynamic content web sites, and we evaluate their relative impact when used in combination. Full transparency implies strong dat...
Cristiana Amza, Alan L. Cox, Willy Zwaenepoel
162
Voted
DAC
2006
ACM
16 years 5 months ago
An efficient and versatile scheduling algorithm based on SDC formulation
Scheduling plays a central role in the behavioral synthesis process, which automatically compiles high-level specifications into optimized hardware implementations. However, most ...
Jason Cong, Zhiru Zhang
ICSE
2008
IEEE-ACM
16 years 5 months ago
Predicting defects using network analysis on dependency graphs
In software development, resources for quality assurance are limited by time and by cost. In order to allocate resources effectively, managers need to rely on their experience bac...
Thomas Zimmermann, Nachiappan Nagappan