Sciweavers

1425 search results - page 231 / 285
» Beyond Dependency Graphs
Sort
View
PERCOM
2006
ACM
14 years 7 months ago
Avoiding privacy violations caused by context-sensitive services
The increasing availability of information about people's context makes it possible to deploy context-sensitive services, where access to resources provided or managed by a s...
Urs Hengartner, Peter Steenkiste
SDM
2009
SIAM
291views Data Mining» more  SDM 2009»
14 years 5 months ago
Detection and Characterization of Anomalies in Multivariate Time Series.
Anomaly detection in multivariate time series is an important data mining task with applications to ecosystem modeling, network traffic monitoring, medical diagnosis, and other d...
Christopher Potter, Haibin Cheng, Pang-Ning Tan, S...
ICCAD
2005
IEEE
128views Hardware» more  ICCAD 2005»
14 years 5 months ago
Reducing structural bias in technology mapping
Technology mapping based on DAG-covering suffers from the problem of structural bias: the structure of the mapped netlist depends strongly on the subject graph. In this paper we ...
Satrajit Chatterjee, Alan Mishchenko, Robert K. Br...
ICCAD
2005
IEEE
98views Hardware» more  ICCAD 2005»
14 years 5 months ago
Clustering for processing rate optimization
Clustering (or partitioning) is a crucial step between logic synthesis and physical design in the layout of a large scale design. A design verified at the logic synthesis level m...
Chuan Lin, Jia Wang, Hai Zhou
ICCAD
2001
IEEE
124views Hardware» more  ICCAD 2001»
14 years 5 months ago
Partition-Based Decision Heuristics for Image Computation Using SAT and BDDs
Methods based on Boolean satisfiability (SAT) typically use a Conjunctive Normal Form (CNF) representation of the Boolean formula, and exploit the structure of the given problem ...
Aarti Gupta, Zijiang Yang, Pranav Ashar, Lintao Zh...