Sciweavers

4233 search results - page 114 / 847
» Three Paths to Effectiveness
Sort
View
CCS
2006
ACM
15 years 7 months ago
An effective defense against email spam laundering
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Mengjun Xie, Heng Yin, Haining Wang
KDD
2007
ACM
165views Data Mining» more  KDD 2007»
16 years 4 months ago
Efficient and effective explanation of change in hierarchical summaries
Dimension attributes in data warehouses are typically hierarchical (e.g., geographic locations in sales data, URLs in Web traffic logs). OLAP tools are used to summarize the measu...
Deepak Agarwal, Dhiman Barman, Dimitrios Gunopulos...
ATAL
2010
Springer
15 years 5 months ago
An effective personal mobile robot agent through symbiotic human-robot interaction
Several researchers, present authors included, envision personal mobile robot agents that can assist humans in their daily tasks. Despite many advances in robotics, such mobile ro...
Stephanie Rosenthal, Joydeep Biswas, Manuela M. Ve...
127
Voted
ICCAD
1999
IEEE
99views Hardware» more  ICCAD 1999»
15 years 8 months ago
Concurrent logic restructuring and placement for timing closure
: In this paper, an algorithm for simultaneous logic restructuring and placement is presented. This algorithm first constructs a set of super-cells along the critical paths and the...
Jinan Lou, Wei Chen, Massoud Pedram
ASYNC
1998
IEEE
84views Hardware» more  ASYNC 1998»
15 years 8 months ago
Average-Case Optimized Transistor-Level Technology Mapping of Extended Burst-Mode Circuits
We describe an automated method (3D-map) for determining near-optimal decomposed generalized C-element (gC) implementations of extended burst-mode asynchronous controllers. Averag...
Kevin W. James, Kenneth Y. Yun