Sciweavers

2763 search results - page 543 / 553
» The Dangerous 'All' in Specifications
Sort
View
WAOA
2010
Springer
246views Algorithms» more  WAOA 2010»
13 years 5 months ago
Tradeoff between Energy and Throughput for Online Deadline Scheduling
The past few years have witnessed a number of interesting online algorithms for deadline scheduling in the dynamic speed scaling model (in which a processor can vary its speed to ...
Ho-Leung Chan, Tak Wah Lam, Rongbin Li
AICS
2009
13 years 5 months ago
SceneMaker: Intelligent Multimodal Visualisation of Natural Language Scripts
Abstract. Producing plays, films or animations is a complex and expensive process involving various professionals and media. Our proposed software system, SceneMaker, aims to facil...
Eva Hanser, Paul McKevitt, Tom Lunney, Joan Condel...
ANCS
2009
ACM
13 years 5 months ago
Progressive hashing for packet processing using set associative memory
As the Internet grows, both the number of rules in packet filtering databases and the number of prefixes in IP lookup tables inside the router are growing. The packet processing e...
Michel Hanna, Socrates Demetriades, Sangyeun Cho, ...
CLEF
2009
Springer
13 years 5 months ago
Overview of the CLEF 2009 Robot Vision Track
The robot vision task has been proposed to the ImageCLEF participants for the first time in 2009. The task attracted a considerable attention, with 19 inscribed research groups, 7...
Andrzej Pronobis, Li Xing, Barbara Caputo
FAST
2009
13 years 5 months ago
Provenance as Data Mining: Combining File System Metadata with Content Analysis
Provenance describes how an object came to be in its present state. Thus, it describes the evolution of the object over time. Prior work on provenance has focussed on databases an...
Vinay Deolalikar, Hernan Laffitte