Sciweavers

11051 search results - page 2120 / 2211
» An Investigation of Generalized Cases
Sort
View
EMNETS
2007
14 years 2 months ago
Robust node localization for wireless sensor networks
The node localization problem in Wireless Sensor Networks has received considerable attention, driven by the need to obtain a higher location accuracy without incurring a large, p...
Radu Stoleru, John A. Stankovic, Sang Hyuk Son
DAC
2010
ACM
14 years 2 months ago
TSV stress aware timing analysis with applications to 3D-IC layout optimization
As the geometry shrinking faces severe limitations, 3D wafer stacking with through silicon via (TSV) has gained interest for future SOC integration. Since TSV fill material and s...
Jae-Seok Yang, Krit Athikulwongse, Young-Joon Lee,...
ICCBR
2010
Springer
14 years 2 months ago
Imitating Inscrutable Enemies: Learning from Stochastic Policy Observation, Retrieval and Reuse
In this paper we study the topic of CBR systems learning from observations in which those observations can be represented as stochastic policies. We describe a general framework wh...
Kellen Gillespie, Justin Karneeb, Stephen Lee-Urba...
ISSTA
2010
ACM
14 years 2 months ago
Automatic detection of unsafe component loadings
Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is cri...
Taeho Kwon, Zhendong Su
KDD
2010
ACM
259views Data Mining» more  KDD 2010»
14 years 2 months ago
A probabilistic model for personalized tag prediction
Social tagging systems have become increasingly popular for sharing and organizing web resources. Tag recommendation is a common feature of social tagging systems. Social tagging ...
Dawei Yin, Zhenzhen Xue, Liangjie Hong, Brian D. D...
« Prev « First page 2120 / 2211 Last » Next »