Sciweavers

1687 search results - page 206 / 338
» Which pointer analysis should I use
Sort
View
ICCAD
1998
IEEE
94views Hardware» more  ICCAD 1998»
15 years 9 months ago
Noise considerations in circuit optimization
Noise can cause digital circuits to switch incorrectly and thus produce spurious results. Noise can also have adverse power, timing and reliability e ects. Dynamic logic is partic...
Andrew R. Conn, Ruud A. Haring, Chandramouli Viswe...
158
Voted
EWSN
2010
Springer
15 years 8 months ago
An Adaptive Strategy for Energy-Efficient Data Collection in Sparse Wireless Sensor Networks
Sparse wireless sensor networks (WSNs) are being effectively used in several applications, which include transportation, urban safety, environment monitoring, and many others. Sens...
Mario Di Francesco, Kunal Shah, Mohan Kumar, Giuse...
IDA
2007
Springer
15 years 4 months ago
An evaluation of Naive Bayes variants in content-based learning for spam filtering
We describe an in-depth analysis of spam-filtering performance of a simple Naive Bayes learner and two extended variants. A set of seven mailboxes comprising about 65,000 mails f...
Alexander K. Seewald
CN
2007
133views more  CN 2007»
15 years 4 months ago
Automatic high-performance reconstruction and recovery
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time and prevent execution. We argue that it is impossible to perfectly self-protec...
Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Mai...
ICIP
2001
IEEE
16 years 6 months ago
Restoration of images scanned from thick bound documents
Perspective distortion always occurs while scanning thick, bound documents. This distortion mainly causes two sources of degradation for the scanned grayscale image ? i) shade alo...
Zheng Zhang 0003, Chew Lim Tan