Sciweavers

1687 search results - page 160 / 338
» Which pointer analysis should I use
Sort
View
ICMCS
2009
IEEE
153views Multimedia» more  ICMCS 2009»
15 years 2 months ago
Network coding-aware rate control and scheduling in wireless networks
Network coding has been recently applied to wireless networks to increase throughput. It is typically implemented as a thin layer between MAC and IP, transparently to higher layer...
Hulya Seferoglu, Athina Markopoulou, Ulas C. Kozat
SDM
2009
SIAM
164views Data Mining» more  SDM 2009»
16 years 1 months ago
Time-Decayed Correlated Aggregates over Data Streams.
Data stream analysis frequently relies on identifying correlations and posing conditional queries on the data after it has been seen. Correlated aggregates form an important examp...
Graham Cormode, Srikanta Tirthapura, Bojian Xu
SAS
2001
Springer
121views Formal Methods» more  SAS 2001»
15 years 8 months ago
Embedding Chaos
Model checking would answer all finite-state verification problems, if it were not for the notorious state-space explosion problem. A problem of practical importance, which attra...
Natalia Sidorova, Martin Steffen
POPL
2000
ACM
15 years 8 months ago
A Type System for Dynamic Web Documents
Many interactive Web services use the CGI interface for communication with clients. They will dynamically create HTML documents that are presented to the client who then resumes t...
Anders Sandholm, Michael I. Schwartzbach
GECCO
2008
Springer
162views Optimization» more  GECCO 2008»
15 years 5 months ago
Robust method of detecting moving objects in videos evolved by genetic programming
In this paper we investigated the use of Genetic Programming (GP) to evolve programs which could detect moving objects in videos. Two main approaches under the paradigm were propo...
Andy Song, Danny Fang