Clock network is a vulnerable victim of variations as well as a main power consumer in many integrated circuits. Recently, link-based non-tree clock network attracts people's...
Consumers increasingly go online to rate, review and research products (Jansen, 2010; Litvin et al., 2008). Consequently, websites containing these reviews are becoming targets of...
Myle Ott, Yejin Choi, Claire Cardie, Jeffrey T. Ha...
- Scientific workflows have become an integral part of cyberinfrastructure as their computational complexity and data sizes have grown. However, the complexity of the distributed i...
We propose a language-independent method for the automatic extraction of transliteration pairs from parallel corpora. In contrast to previous work, our method uses no form of supe...
Due to the lack of explicit spatial consideration, existing
epitome model may fail for image recognition and target detection,
which directly motivates us to propose the so-calle...
Xinqi Chu, Shuicheng Yan, Liyuan Li, Kap Luk Chan,...