Sciweavers

23406 search results - page 4678 / 4682
» Architecture, Design, Implementation
Sort
View
PLDI
2012
ACM
11 years 9 months ago
Diderot: a parallel DSL for image analysis and visualization
Research scientists and medical professionals use imaging technology, such as computed tomography (CT) and magnetic resonance imaging (MRI) to measure a wide variety of biological...
Charisee Chiw, Gordon Kindlmann, John Reppy, Lamon...
PLDI
2012
ACM
11 years 9 months ago
Test-case reduction for C compiler bugs
To report a compiler bug, one must often find a small test case that triggers the bug. The existing approach to automated test-case reduction, delta debugging, works by removing ...
John Regehr, Yang Chen, Pascal Cuoq, Eric Eide, Ch...
INFOCOM
2012
IEEE
11 years 9 months ago
Estimating age privacy leakage in online social networks
—It is well known that Online Social Networks (OSNs) are vulnerable to privacy leakages, whereby specific information about a user (political affiliation, sexual orientation, g...
Ratan Dey, Cong Tang, Keith W. Ross, Nitesh Saxena
INFOCOM
2012
IEEE
11 years 9 months ago
Realizing the full potential of PSM using proxying
Abstract—The WiFi radio in smartphones consumes a significant portion of energy when active. To reduce the energy consumption, the Power Saving Mode was standardized in IEEE 802...
Ning Ding, Abhinav Pathak, Dimitrios Koutsonikolas...
KDD
2012
ACM
271views Data Mining» more  KDD 2012»
11 years 9 months ago
GigaTensor: scaling tensor analysis up by 100 times - algorithms and discoveries
Many data are modeled as tensors, or multi dimensional arrays. Examples include the predicates (subject, verb, object) in knowledge bases, hyperlinks and anchor texts in the Web g...
U. Kang, Evangelos E. Papalexakis, Abhay Harpale, ...
« Prev « First page 4678 / 4682 Last » Next »