Sciweavers

195 search results - page 29 / 39
» A Riemannian approach to graph embedding
Sort
View
SIGMOD
2008
ACM
215views Database» more  SIGMOD 2008»
14 years 7 months ago
CSV: visualizing and mining cohesive subgraphs
Extracting dense sub-components from graphs efficiently is an important objective in a wide range of application domains ranging from social network analysis to biological network...
Nan Wang, Srinivasan Parthasarathy, Kian-Lee Tan, ...
DAC
1999
ACM
14 years 8 months ago
Constraint Driven Code Selection for Fixed-Point DSPs
Abstract? Fixed-point DSPs are a class of embedded processors with highly irregular architectures. This irregularity makes it difficult to generate high-quality machine code from p...
Steven Bashford, Rainer Leupers
IROS
2008
IEEE
125views Robotics» more  IROS 2008»
14 years 2 months ago
Neighborhood denoising for learning high-dimensional grasping manifolds
— Human control of high degree-of-freedom robotic systems, e.g. anthropomorphic robot hands, is often difficult due to the overwhelming number of variables that need to be speci...
Aggeliki Tsoli, Odest Chadwicke Jenkins
DATE
2010
IEEE
153views Hardware» more  DATE 2010»
14 years 1 days ago
Energy-efficient task allocation and scheduling for multi-mode MPSoCs under lifetime reliability constraint
In this paper, we consider energy minimization for multiprocessor system-on-a-chip (MPSoC) under lifetime reliability constraint of the system, which has become a serious concern ...
Lin Huang, Qiang Xu
ACSAC
2008
IEEE
14 years 2 months ago
STILL: Exploit Code Detection via Static Taint and Initialization Analyses
We propose STILL, a generic defense based on Static Taint and InitiaLization anaLyses, to detect exploit code embedded in data streams/requests targeting at various Internet servi...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu