Sciweavers

1929 search results - page 284 / 386
» An Approach to Limit the Wynot Problem
Sort
View
ECOOP
2009
Springer
14 years 9 months ago
From Public to Private to Absent: Refactoring Java Programs under Constrained Accessibility
Contemporary refactoring tools for JAVA aiding in the restructuring of programs have problems with respecting access modifiers such as public and private: while some tools provide ...
Friedrich Steimann, Andreas Thies
EDBT
2008
ACM
99views Database» more  EDBT 2008»
14 years 9 months ago
Querying time-series streams
Index trees created using distance based indexing are difficult to maintain online since the distance function involved is often costly to compute. This problem is intensified whe...
Vivekanand Gopalkrishnan
ICCD
2002
IEEE
108views Hardware» more  ICCD 2002»
14 years 5 months ago
Low Power Mixed-Mode BIST Based on Mask Pattern Generation Using Dual LFSR Re-Seeding
Low power design techniques have been employed for more than two decades, however an emerging problem is satisfying the test power constraints for avoiding destructive test and im...
Paul M. Rosinger, Bashir M. Al-Hashimi, Nicola Nic...
EVOW
2009
Springer
14 years 3 months ago
Evolutionary Optimization Guided by Entropy-Based Discretization
The Learnable Evolution Model (LEM) involves alternating periods of optimization and learning, performa extremely well on a range of problems, a specialises in achieveing good resu...
Guleng Sheri, David W. Corne
INFOCOM
2009
IEEE
14 years 3 months ago
Tuning Skype's Redundancy Control Algorithm for User Satisfaction
—Determining how to transport delay-sensitive voice data has long been a problem in multimedia networking. The difficulty arises because voice and best-effort data are different...
Te-Yuan Huang, Kuan-Ta Chen, Polly Huang