Sciweavers

1061 search results - page 145 / 213
» Integrity Constraints for Linked Data
Sort
View
TSE
2008
113views more  TSE 2008»
13 years 10 months ago
Discovering Neglected Conditions in Software by Mining Dependence Graphs
Neglected conditions are an important but difficult-to-find class of software defects. This paper presents a novel approach for revealing neglected conditions that integrates stati...
Ray-Yaung Chang, Andy Podgurski, Jiong Yang
ISPD
2010
ACM
195views Hardware» more  ISPD 2010»
14 years 4 months ago
Density gradient minimization with coupling-constrained dummy fill for CMP control
In the nanometer IC design, dummy fill is often performed to improve layout pattern uniformity and the post-CMP quality. However, filling dummies might greatly increase intercon...
Huang-Yu Chen, Szu-Jui Chou, Yao-Wen Chang
ERCIMDL
2006
Springer
155views Education» more  ERCIMDL 2006»
14 years 1 months ago
SIERRA - A Superimposed Application for Enhanced Image Description and Retrieval
In this demo proposal, we describe our prototype application, SIERRA, which combines text-based and content-based image retrieval and allows users to link together image content of...
Uma Murthy, Ricardo da Silva Torres, Edward A. Fox
TWC
2010
13 years 4 months ago
On the diversity order of non-orthogonal amplify-and-forward over block-fading channels
Abstract--In this paper, we deal with the performance of nonorthogonal Amplify-and-Forward protocols over block-fading channels (BFNAF), where the source retransmits the same data ...
Ioannis Krikidis, John S. Thompson, Steve McLaughl...
SIGMOD
2010
ACM
217views Database» more  SIGMOD 2010»
14 years 2 months ago
Mining knowledge from databases: an information network analysis approach
Most people consider a database is merely a data repository that supports data storage and retrieval. Actually, a database contains rich, inter-related, multi-typed data and infor...
Jiawei Han, Yizhou Sun, Xifeng Yan, Philip S. Yu