Sciweavers

2315 search results - page 269 / 463
» Does EigenPalm work
Sort
View
SAC
2008
ACM
13 years 7 months ago
Removing useless variables in cost analysis of Java bytecode
Automatic cost analysis has interesting applications in the context of verification and certification of mobile code. For instance, the code receiver can use cost information in o...
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...
TPDS
2008
134views more  TPDS 2008»
13 years 7 months ago
Extending the TokenCMP Cache Coherence Protocol for Low Overhead Fault Tolerance in CMP Architectures
It is widely accepted that transient failures will appear more frequently in chips designed in the near future due to several factors such as the increased integration scale. On th...
Ricardo Fernández Pascual, José M. G...
TROB
2008
228views more  TROB 2008»
13 years 7 months ago
Large-Scale 6-DOF SLAM With Stereo-in-Hand
In this paper, we describe a system that can carry4 out simultaneous localization and mapping (SLAM) in large in-5 door and outdoor environments using a stereo pair moving with 66 ...
Lina María Paz, Pedro Pinies, Juan D. Tard&...
CIKM
2010
Springer
13 years 6 months ago
Automatically suggesting topics for augmenting text documents
We present a method for automated topic suggestion. Given a plain-text input document, our algorithm produces a ranking of novel topics that could enrich the input document in a m...
Robert West, Doina Precup, Joelle Pineau
EDBT
2010
ACM
181views Database» more  EDBT 2010»
13 years 6 months ago
Private record matching using differential privacy
Private matching between datasets owned by distinct parties is a challenging problem with several applications. Private matching allows two parties to identify the records that ar...
Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, Eli...