Sciweavers

3591 search results - page 596 / 719
» Typing linear constraints
Sort
View
ICDE
2008
IEEE
154views Database» more  ICDE 2008»
16 years 6 months ago
Butterfly: Protecting Output Privacy in Stream Mining
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
Ting Wang, Ling Liu
ICPR
2006
IEEE
16 years 6 months ago
A Texture Based Matching Approach for Automated Assembly of Puzzles
The puzzle assembly problem has many application areas such as restoration and reconstruction of archeological findings, repairing of broken objects, solving jigsaw type puzzles, ...
Mahmut Samil Sagiroglu, Aytül Erçil
DAC
2007
ACM
16 years 6 months ago
Placement of 3D ICs with Thermal and Interlayer Via Considerations
Thermal problems and limitations on interlayer via densities are important design constraints on three-dimensional integrated circuits (3D ICs), and need to be considered during g...
Brent Goplen, Sachin S. Sapatnekar
136
Voted
DAC
2006
ACM
16 years 6 months ago
Gate sizing: finFETs vs 32nm bulk MOSFETs
FinFET devices promise to replace traditional MOSFETs because of superior ability in controlling leakage and minimizing short channel effects while delivering a strong drive curre...
Brian Swahn, Soha Hassoun
ICSE
2008
IEEE-ACM
16 years 6 months ago
Systematically refactoring inheritance to delegation in java
Because of the strong coupling of classes and the proliferation of unneeded class members induced by inheritance, the suggestion to use composition and delegation instead has beco...
Hannes Kegel, Friedrich Steimann