Sciweavers

12659 search results - page 2503 / 2532
» The distributed breakout algorithms
Sort
View
SIGMOD
2010
ACM
207views Database» more  SIGMOD 2010»
14 years 9 months ago
Leveraging spatio-temporal redundancy for RFID data cleansing
Radio Frequency Identification (RFID) technologies are used in many applications for data collection. However, raw RFID readings are usually of low quality and may contain many an...
Haiquan Chen, Wei-Shinn Ku, Haixun Wang, Min-Te Su...
SOFTVIS
2010
ACM
14 years 9 months ago
Heapviz: interactive heap visualization for program understanding and debugging
Understanding the data structures in a program is crucial to understanding how the program works, or why it doesn't work. Inspecting the code that implements the data structu...
Edward Aftandilian, Sean Kelley, Connor Gramazio, ...
ICASSP
2010
IEEE
14 years 9 months ago
Disparity search range estimation: Enforcing temporal consistency
This paper presents a new approach for estimating the disparity search range in stereo video that enforces temporal consistency. Reliable search range estimation is very important...
Dongbo Min, Sehoon Yea, Zafer Arican, Anthony Vetr...
MOBISYS
2010
ACM
14 years 12 months ago
MAUI: making smartphones last longer with code offload
This paper presents MAUI, a system that enables fine-grained energy-aware offload of mobile code to the infrastructure. Previous approaches to these problems either relied heavily...
Eduardo Cuervo, Aruna Balasubramanian, Dae-ki Cho,...
AI
2010
Springer
14 years 9 months ago
Understanding the scalability of Bayesian network inference using clique tree growth curves
Bayesian networks (BNs) are used to represent and ef ciently compute with multi-variate probability distributions in a wide range of disciplines. One of the main approaches to per...
Ole J. Mengshoel
« Prev « First page 2503 / 2532 Last » Next »