Sciweavers

38 search results - page 6 / 8
» The Backdoor Key: A Path to Understanding Problem Hardness
Sort
View
MOBICOM
2009
ACM
14 years 2 months ago
Data fusion improves the coverage of wireless sensor networks
Wireless sensor networks (WSNs) have been increasingly available for critical applications such as security surveillance and environmental monitoring. An important performance mea...
Guoliang Xing, Rui Tan, Benyuan Liu, Jianping Wang...
DAC
2007
ACM
14 years 8 months ago
Progressive Decomposition: A Heuristic to Structure Arithmetic Circuits
Despite the impressive progress of logic synthesis in the past decade, finding the best architecture for a given circuit still remains an open problem and largely unsolved. In mos...
Ajay K. Verma, Philip Brisk, Paolo Ienne
JUCS
2008
124views more  JUCS 2008»
13 years 7 months ago
Query Transformation Based on Semantic Centrality in Semantic Social Network1
: Query transformation is a serious hurdle on semantic peer-to-peer environment. For interoperability between peers, queries sent from a source peer have to be efficiently transfor...
Jason J. Jung
GIS
2009
ACM
14 years 6 days ago
Focus+Glue+Context: an improved fisheye approach for web map services
This paper proposes a method for generating a Focus+Glue +Context map for Web map services by improving existing fisheye views methods for cartographic data. While many studies h...
Daisuke Yamamoto, Shotaro Ozeki, Naohisa Takahashi
KDD
2010
ACM
217views Data Mining» more  KDD 2010»
13 years 6 months ago
Mining program workflow from interleaved traces
Successful software maintenance is becoming increasingly critical due to the increasing dependence of our society and economy on software systems. One key problem of software main...
Jian-Guang Lou, Qiang Fu, Shengqi Yang, Jiang Li, ...