Sciweavers

161 search results - page 26 / 33
» Transforming general networks into feed-forward by using tur...
Sort
View
KDD
1999
ACM
128views Data Mining» more  KDD 1999»
13 years 11 months ago
Towards Automated Synthesis of Data Mining Programs
Code synthesis is routinely used in industry to generate GUIs, form lling applications, and database support code and is even used with COBOL. In this paper we consider the questi...
Wray L. Buntine, Bernd Fischer 0002, Thomas Pressb...
LCTRTS
2009
Springer
14 years 1 months ago
Eliminating the call stack to save RAM
Most programming languages support a call stack in the programming model and also in the runtime system. We show that for applications targeting low-power embedded microcontroller...
Xuejun Yang, Nathan Cooprider, John Regehr
SIGCOMM
2006
ACM
14 years 20 days ago
Algorithms to accelerate multiple regular expressions matching for deep packet inspection
There is a growing demand for network devices capable of examining the content of data packets in order to improve network security and provide application-specific services. Most...
Sailesh Kumar, Sarang Dharmapurikar, Fang Yu, Patr...
IPSN
2010
Springer
14 years 1 months ago
Self-identifying sensor data
Public-use sensor datasets are a useful scientific resource with the unfortunate feature that their provenance is easily disconnected from their content. To address this we intro...
Stephen Chong, Christian Skalka, Jeffrey A. Vaugha...
ICANN
2010
Springer
13 years 5 months ago
Teaching Humanoids to Imitate 'Shapes' of Movements
Trajectory formation is one of the basic functions of the neuromotor controller. In particular, reaching, avoiding, controlling impacts (hitting), drawing, dancing and imitating ar...
Vishwanathan Mohan, Giorgio Metta, Jacopo Zenzeri,...