Sciweavers

12659 search results - page 2503 / 2532
» The distributed breakout algorithms
Sort
View
150
Voted
SIGMOD
2010
ACM
207views Database» more  SIGMOD 2010»
15 years 3 months ago
Leveraging spatio-temporal redundancy for RFID data cleansing
Radio Frequency Identification (RFID) technologies are used in many applications for data collection. However, raw RFID readings are usually of low quality and may contain many an...
Haiquan Chen, Wei-Shinn Ku, Haixun Wang, Min-Te Su...
166
Voted
SOFTVIS
2010
ACM
15 years 3 months ago
Heapviz: interactive heap visualization for program understanding and debugging
Understanding the data structures in a program is crucial to understanding how the program works, or why it doesn't work. Inspecting the code that implements the data structu...
Edward Aftandilian, Sean Kelley, Connor Gramazio, ...
111
Voted
ICASSP
2010
IEEE
15 years 3 months ago
Disparity search range estimation: Enforcing temporal consistency
This paper presents a new approach for estimating the disparity search range in stereo video that enforces temporal consistency. Reliable search range estimation is very important...
Dongbo Min, Sehoon Yea, Zafer Arican, Anthony Vetr...
142
Voted
MOBISYS
2010
ACM
15 years 6 months ago
MAUI: making smartphones last longer with code offload
This paper presents MAUI, a system that enables fine-grained energy-aware offload of mobile code to the infrastructure. Previous approaches to these problems either relied heavily...
Eduardo Cuervo, Aruna Balasubramanian, Dae-ki Cho,...
164
Voted
AI
2010
Springer
15 years 3 months ago
Understanding the scalability of Bayesian network inference using clique tree growth curves
Bayesian networks (BNs) are used to represent and ef ciently compute with multi-variate probability distributions in a wide range of disciplines. One of the main approaches to per...
Ole J. Mengshoel
« Prev « First page 2503 / 2532 Last » Next »