Sciweavers

3686 search results - page 139 / 738
» Comprehensive comprehensions
Sort
View
ISCC
2007
IEEE
109views Communications» more  ISCC 2007»
14 years 3 months ago
Embeddable Overlay Networks
—The accuracy of network coordinate (NC) which is comprehensively applied is suffering seriously from Triangle Inequality Violations (TIVs). A novel approach - Embeddable Overlay...
Eng Keong Lua, Timothy G. Griffin
IWPC
2007
IEEE
14 years 3 months ago
A Hybrid Program Model for Object-Oriented Reverse Engineering
A commonly used strategy to address the scalability challenge in object-oriented reverse engineering is to synthesize coarse-grained representations, such as package diagrams. How...
Michael W. Godfrey
AI
2007
Springer
14 years 3 months ago
Constructing a User Preference Ontology for Anti-spam Mail Systems
The judgment that whether an email is spam or non-spam may vary from person to person. Different individuals can have totally different responses to the same email based on their p...
Jongwan Kim, Dejing Dou, Haishan Liu, Donghwi Kwak
PAKDD
2007
ACM
166views Data Mining» more  PAKDD 2007»
14 years 3 months ago
gPrune: A Constraint Pushing Framework for Graph Pattern Mining
In graph mining applications, there has been an increasingly strong urge for imposing user-specified constraints on the mining results. However, unlike most traditional itemset co...
Feida Zhu, Xifeng Yan, Jiawei Han, Philip S. Yu
DSN
2006
IEEE
14 years 3 months ago
Exploring Fault-Tolerant Network-on-Chip Architectures
The advent of deep sub-micron technology has exacerbated reliability issues in on-chip interconnects. In particular, single event upsets, such as soft errors, and hard faults are ...
Dongkook Park, Chrysostomos Nicopoulos, Jongman Ki...