Sciweavers

2038 search results - page 270 / 408
» Loops under Strategies
Sort
View
ICDE
2007
IEEE
161views Database» more  ICDE 2007»
16 years 5 months ago
Mining Colossal Frequent Patterns by Core Pattern Fusion
Extensive research for frequent-pattern mining in the past decade has brought forth a number of pattern mining algorithms that are both effective and efficient. However, the exist...
Feida Zhu, Xifeng Yan, Jiawei Han, Philip S. Yu, H...
ICDE
1996
IEEE
126views Database» more  ICDE 1996»
16 years 5 months ago
Using Object-Oriented Principles to Optimize Update Propagation to Materialized Views
View materialization is known to be a valuable technique for performance optimization in relational databases, and much work has been done addressing the problem of consistently m...
Harumi A. Kuno, Elke A. Rundensteiner
GIS
2008
ACM
16 years 5 months ago
Autonomous navigation of mobile agents using RFID-enabled space partitions
Existing techniques for autonomous indoor navigation are often environment-specific and thus limited in terms of their applicability. In this paper, we take a fundamentally differ...
Muhammad Atif Mehmood, Lars Kulik, Egemen Tanin
130
Voted
DAC
1998
ACM
16 years 5 months ago
Exact Tree-based FPGA Technology Mapping for Logic Blocks with Independent LUTs
The logic blocks CLBs of a lookup table LUT based FPGA consist of one or more LUTs, possibly of di erent sizes. In this paper, we focus on technology mapping for CLBs with several...
Madhukar R. Korupolu, K. K. Lee, D. F. Wong
DAC
2005
ACM
16 years 5 months ago
Towards scalable flow and context sensitive pointer analysis
Pointer analysis, a classic problem in software program analysis, has emerged as an important problem to solve in design automation, at a time when complex designs, specified in t...
Jianwen Zhu