Sciweavers

1687 search results - page 190 / 338
» Which pointer analysis should I use
Sort
View
142
Voted
NIPS
1998
15 years 5 months ago
Modeling Surround Suppression in V1 Neurons with a Statistically Derived Normalization Model
We examine the statistics of natural monochromatic images decomposed using a multi-scale wavelet basis. Although the coefficients of this representation are nearly decorrelated, t...
Eero P. Simoncelli, Odelia Schwartz
122
Voted
SIGMETRICS
1997
ACM
117views Hardware» more  SIGMETRICS 1997»
15 years 8 months ago
Informed Multi-Process Prefetching and Caching
Informed prefetching and caching based on application disclosure of future I/O accesses (hints) can dramatically reduce the execution time of I/O-intensive applications. A recent ...
Andrew Tomkins, R. Hugo Patterson, Garth A. Gibson
LREC
2008
128views Education» more  LREC 2008»
15 years 6 months ago
Unsupervised Lexical Acquisition for Part of Speech Tagging
It is known that POS tagging is not very accurate for unknown words (words which the POS tagger has not seen in the training corpora). Thus, a first step to improve the tagging ac...
Dan Tufis, Elena Irimia, Radu Ion, Alexandru Ceaus...
RIAO
2000
15 years 5 months ago
MproIR - A cross-language Information retrieval
With the globalization of the world markets, the need for multilingual information processing increases, because the users are increasingly forced to deal with information availab...
Bärbel Ripplinger
123
Voted
SIGACT
2010
68views more  SIGACT 2010»
14 years 11 months ago
A survey of buffer management policies for packet switches
Over the past decade, there has been great interest in the study of buffer management policies in the context of packet transmission for network switches. In a typical model, a sw...
Michael H. Goldwasser