Sciweavers

1687 search results - page 233 / 338
» Which pointer analysis should I use
Sort
View
KDD
2003
ACM
269views Data Mining» more  KDD 2003»
16 years 4 months ago
Maximizing the spread of influence through a social network
Models for the processes by which ideas and influence propagate through a social network have been studied in a number of domains, including the diffusion of medical and technolog...
David Kempe, Jon M. Kleinberg, Éva Tardos
BMCBI
2005
169views more  BMCBI 2005»
15 years 4 months ago
An adaptive method for cDNA microarray normalization
Background: Normalization is a critical step in analysis of gene expression profiles. For duallabeled arrays, global normalization assumes that the majority of the genes on the ar...
Yingdong Zhao, Ming-Chung Li, Richard Simon
VRCAI
2006
ACM
15 years 10 months ago
Parallel-split shadow maps for large-scale virtual environments
Shadowing effects dramatically enhance the realism of virtual environments by providing useful visual cues. Shadow mapping is an efficient algorithm for real-time shadow renderin...
Fan Zhang, Hanqiu Sun, Leilei Xu, Lee Kit Lun
ICIP
2006
IEEE
16 years 6 months ago
CLIX: Network Coding and Cross Layer Information Exchange of Wireless Video
Network Coding (NC) can be efficiently combined with the "physical layer broadcast" property of wireless mediums to facilitate mutual exchange of independent information...
Shirish S. Karande, Kiran Misra, Hayder Radha
ICDE
2006
IEEE
138views Database» more  ICDE 2006»
16 years 5 months ago
SUBSKY: Efficient Computation of Skylines in Subspaces
Given a set of multi-dimensional points, the skyline contains the best points according to any preference function that is monotone on all axes. In practice, applications that req...
Yufei Tao, Xiaokui Xiao, Jian Pei