Sciweavers

4306 search results - page 720 / 862
» Timed Testing with TorX
Sort
View
CP
2009
Springer
15 years 10 months ago
Confidence-Based Work Stealing in Parallel Constraint Programming
The most popular architecture for parallel search is work stealing: threads that have run out of work (nodes to be searched) steal from threads that still have work. Work stealing ...
Geoffrey Chu, Christian Schulte, Peter J. Stuckey
DCC
2009
IEEE
15 years 10 months ago
H.264/MPEG-4 AVC Encoder Parameter Selection Algorithms for Complexity Distortion Tradeoff
The H.264 encoder has input parameters that determine the bit rate and distortion of the compressed video and the encoding complexity. A set of encoder parameters is referred to a...
Rahul Vanam, Eve A. Riskin, Richard E. Ladner
CHI
2009
ACM
15 years 10 months ago
Finding causes of program output with the Java Whyline
Debugging and diagnostic tools are some of the most important software development tools, but most expect developers choose the right code to inspect. Unfortunately, this rarely o...
Andrew Jensen Ko, Brad A. Myers
KDD
2006
ACM
198views Data Mining» more  KDD 2006»
15 years 10 months ago
Estimating the global pagerank of web communities
Localized search engines are small-scale systems that index a particular community on the web. They offer several benefits over their large-scale counterparts in that they are rel...
Jason V. Davis, Inderjit S. Dhillon
KDD
2006
ACM
200views Data Mining» more  KDD 2006»
15 years 10 months ago
A Random-Walk Based Scoring Algorithm Applied to Recommender Engines
Recommender systems are an emerging technology that helps consumers find interesting products and useful resources. A recommender system makes personalized product suggestions by e...
Augusto Pucci, Marco Gori, Marco Maggini