Sciweavers

661 search results - page 41 / 133
» Combining Information using Hard Constraints
Sort
View
ICSE
2008
IEEE-ACM
16 years 4 months ago
Precise memory leak detection for java software using container profiling
A memory leak in a Java program occurs when object references that are no longer needed are unnecessarily maintained. Such leaks are difficult to understand because static analyse...
Guoqing Xu, Atanas Rountev
ACL
2006
15 years 5 months ago
From Prosodic Trees to Syntactic Trees
This paper describes an ongoing effort to parse the Hebrew Bible. The parser consults the bracketing information extracted from the cantillation marks of the Masoetic text. We fir...
Andi Wu, Kirk Lowery
149
Voted
CASES
2005
ACM
15 years 5 months ago
Optimizing stream programs using linear state space analysis
Digital Signal Processing (DSP) is becoming increasingly widespread in portable devices. Due to harsh constraints on power, latency, and throughput in embedded environments, devel...
Sitij Agrawal, William Thies, Saman P. Amarasinghe
EVOW
2005
Springer
15 years 9 months ago
Heuristic Colour Assignment Strategies for Merge Models in Graph Colouring
In this paper, we combine a powerful representation for graph colouring problems with different heuristic strategies for colour assignment. Our novel strategies employ heuristics ...
István Juhos, Attila Tóth, Jano I. v...
122
Voted
MIR
2006
ACM
267views Multimedia» more  MIR 2006»
15 years 9 months ago
Matching slides to presentation videos using SIFT and scene background matching
We present a general approach for automatically matching electronic slides to videos of corresponding presentations for use in distance learning and video proceedings of conferenc...
Quanfu Fan, Kobus Barnard, Arnon Amir, Alon Efrat,...