Sciweavers

529 search results - page 90 / 106
» Design and Test Space Exploration of Transport-Triggered Arc...
Sort
View
ICDE
2006
IEEE
222views Database» more  ICDE 2006»
14 years 9 months ago
CLAN: An Algorithm for Mining Closed Cliques from Large Dense Graph Databases
Most previously proposed frequent graph mining algorithms are intended to find the complete set of all frequent, closed subgraphs. However, in many cases only a subset of the freq...
Jianyong Wang, Zhiping Zeng, Lizhu Zhou
MICRO
2010
IEEE
142views Hardware» more  MICRO 2010»
13 years 5 months ago
Virtual Snooping: Filtering Snoops in Virtualized Multi-cores
Virtualization has been rapidly expanding its applications in numerous server and desktop environments to improve the utilization and manageability of physical systems. Such prolif...
Daehoon Kim, Hwanju Kim, Jaehyuk Huh
IWMM
2011
Springer
206views Hardware» more  IWMM 2011»
12 years 10 months ago
A comprehensive evaluation of object scanning techniques
At the heart of all garbage collectors lies the process of identifying and processing reference fields within an object. Despite its key role, and evidence of many different impl...
Robin Garner, Stephen M. Blackburn, Daniel Frampto...
DAC
1995
ACM
13 years 11 months ago
Orthogonal Greedy Coupling - A New Optimization Approach to 2-D FPGA Routing
We propose a novel optimization scheme that can improve the routing by reducing a newly observed router decaying effect. A pair of greedy-grow algorithms, each emphasizing a diffe...
Yu-Liang Wu, Malgorzata Marek-Sadowska
ICASSP
2008
IEEE
14 years 2 months ago
Using dialogue acts to learn better repair strategies for spoken dialogue systems
Repair or error-recovery strategies are an important design issue in Spoken Dialogue Systems (SDSs) - how to conduct the dialogue when there is no progress (e.g. due to repeated A...
Matthew Frampton, Oliver Lemon