Sciweavers

811 search results - page 97 / 163
» Refactoring Using Type Constraints
Sort
View
EJWCN
2010
94views more  EJWCN 2010»
13 years 3 months ago
Efficient Scheduling of Pigeons for a Constrained Delay Tolerant Application
Information collection in the disaster area is an important application of pigeon networks - a special type of delay tolerant networks (DTN) that borrows the ancient idea of using ...
Jiazhen Zhou, Jiang Li, Legand L. Burge III
VLSID
2003
IEEE
134views VLSI» more  VLSID 2003»
14 years 9 months ago
A Framework for Energy and Transient Power Reduction during Behavioral Synthesis
Abstract-- In battery driven portable applications, the minimization of energy, average power, peak power, and peak power differential are equally important to improve reliability ...
Saraju P. Mohanty, N. Ranganathan
ICML
2010
IEEE
13 years 10 months ago
Non-Local Contrastive Objectives
Pseudo-likelihood and contrastive divergence are two well-known examples of contrastive methods. These algorithms trade off the probability of the correct label with the probabili...
David Vickrey, Cliff Chiung-Yu Lin, Daphne Koller
CGF
2006
156views more  CGF 2006»
13 years 8 months ago
Semantic Photo Synthesis
Composite images are synthesized from existing photographs by artists who make concept art, e.g., storyboards for movies or architectural planning. Current techniques allow an art...
Matthew Johnson, Gabriel J. Brostow, Jamie Shotton...
GPCE
2007
Springer
14 years 3 months ago
Safe composition of product lines
Programs of a software product line can be synthesized by composing modules that implement features. Besides high-level domain constraints that govern the compatibility of feature...
Sahil Thaker, Don S. Batory, David Kitchin, Willia...