Sciweavers

4438 search results - page 886 / 888
» On the Distribution of Keys by Hashing
Sort
View
ISPD
2012
ACM
288views Hardware» more  ISPD 2012»
12 years 4 months ago
Construction of realistic gate sizing benchmarks with known optimal solutions
Gate sizing in VLSI design is a widely-used method for power or area recovery subject to timing constraints. Several previous works have proposed gate sizing heuristics for power ...
Andrew B. Kahng, Seokhyeong Kang
SIGMOD
2012
ACM
288views Database» more  SIGMOD 2012»
11 years 11 months ago
Exploiting MapReduce-based similarity joins
Cloud enabled systems have become a crucial component to efficiently process and analyze massive amounts of data. One of the key data processing and analysis operations is the Sim...
Yasin N. Silva, Jason M. Reed
ISSTA
2012
ACM
11 years 11 months ago
Residual investigation: predictive and precise bug detection
We introduce the concept of “residual investigation” for program analysis. A residual investigation is a dynamic check installed as a result of running a static analysis that ...
Kaituo Li, Christoph Reichenbach, Christoph Csalln...
SIGIR
2012
ACM
11 years 11 months ago
Predicting quality flaws in user-generated content: the case of wikipedia
The detection and improvement of low-quality information is a key concern in Web applications that are based on user-generated content; a popular example is the online encyclopedi...
Maik Anderka, Benno Stein, Nedim Lipka
CVPR
2012
IEEE
11 years 10 months ago
Real-time image-based 6-DOF localization in large-scale environments
We present a real-time approach for image-based localization within large scenes that have been reconstructed offline using structure from motion (Sfm). From monocular video, our...
Hyon Lim, Sudipta N. Sinha, Michael F. Cohen, Matt...