Sciweavers

1548 search results - page 243 / 310
» Computational Approaches to Sentence Completion
Sort
View
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
14 years 6 months ago
Identifying Unsafe Routes for Network-Based Trajectory Privacy.
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. ...
Aris Gkoulalas-Divanis, Mohamed F. Mokbel, Vassili...
CSMR
2009
IEEE
14 years 3 months ago
Identification of Extract Method Refactoring Opportunities
Extract Method has been recognized as one of the most important refactorings, since it decomposes large methods and can be used in combination with other refactorings for fixing a...
Nikolaos Tsantalis, Alexander Chatzigeorgiou
RTSS
2009
IEEE
14 years 3 months ago
Multiprocessor Extensions to Real-Time Calculus
Abstract—Many embedded platforms consist of a heterogeneous collection of processing elements, memory modules, and communication subsystems. These components often implement diff...
Hennadiy Leontyev, Samarjit Chakraborty, James H. ...
SAT
2009
Springer
82views Hardware» more  SAT 2009»
14 years 3 months ago
Generalizing Core-Guided Max-SAT
Recent work has shown the value of using unsatisfiable cores to guide maximum satisfiability algorithms (Max-SAT) running on industrial instances [5,9,10,11]. We take this concep...
Mark H. Liffiton, Karem A. Sakallah
ISLPED
2009
ACM
184views Hardware» more  ISLPED 2009»
14 years 3 months ago
Online work maximization under a peak temperature constraint
Increasing power densities and the high cost of low thermal resistance packages and cooling solutions make it impractical to design processors for worst-case temperature scenarios...
Thidapat Chantem, Xiaobo Sharon Hu, Robert P. Dick