Sciweavers

2620 search results - page 492 / 524
» An Evaluation Technique for Binarization Algorithms
Sort
View
TMC
2008
91views more  TMC 2008»
13 years 9 months ago
Efficient and Resilient Backbones for Multihop Wireless Networks
We consider the problem of finding "backbones" in multihop wireless networks. The backbone provides end-toend connectivity, allowing non-backbone nodes to save energy sin...
Seungjoon Lee, Bobby Bhattacharjee, Aravind Sriniv...
TMI
2002
96views more  TMI 2002»
13 years 8 months ago
Imaging of spatiotemporal coincident states by DC optical tomography
The utility of optical tomography as a practical imaging modality has, thus far, been limited by its intrinsically low spatial resolution and quantitative accuracy. Recently, we ha...
Harry L. Graber, Yaling Pei, Randall L. Barbour
PVLDB
2008
127views more  PVLDB 2008»
13 years 8 months ago
Discovering data quality rules
Dirty data is a serious problem for businesses leading to incorrect decision making, inefficient daily operations, and ultimately wasting both time and money. Dirty data often ari...
Fei Chiang, Renée J. Miller
JAIR
2010
131views more  JAIR 2010»
13 years 7 months ago
Narrative Planning: Balancing Plot and Character
Narrative, and in particular storytelling, is an important part of the human experience. Consequently, computational systems that can reason about narrative can be more effective...
Mark O. Riedl, R. Michael Young
MICRO
2010
IEEE
161views Hardware» more  MICRO 2010»
13 years 6 months ago
AtomTracker: A Comprehensive Approach to Atomic Region Inference and Violation Detection
A particularly insidious type of concurrency bug is atomicity violations. While there has been substantial work on automatic detection of atomicity violations, each existing techn...
Abdullah Muzahid, Norimasa Otsuki, Josep Torrellas