Sciweavers

3151 search results - page 501 / 631
» Using query term order for result summarisation
Sort
View
ICCAD
2009
IEEE
117views Hardware» more  ICCAD 2009»
15 years 2 months ago
Binning optimization based on SSTA for transparently-latched circuits
With increasing process variation, binning has become an important technique to improve the values of fabricated chips, especially in high performance microprocessors where transpa...
Min Gong, Hai Zhou, Jun Tao, Xuan Zeng
CORR
2010
Springer
197views Education» more  CORR 2010»
15 years 3 months ago
Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents
—Autonomous wireless agents such as unmanned aerial vehicles, mobile base stations, or self-operating wireless nodes present a great potential for deployment in next-generation w...
Walid Saad, Zhu Han, Tamer Basar, Mérouane ...
SIGSOFT
2010
ACM
15 years 2 months ago
Validity concerns in software engineering research
Empirical studies that use software repository artifacts have become popular in the last decade due to the ready availability of open source project archives. In this paper, we su...
Hyrum K. Wright, Miryung Kim, Dewayne E. Perry
CIVR
2006
Springer
131views Image Analysis» more  CIVR 2006»
15 years 8 months ago
Exploring the Synergy of Humans and Machines in Extreme Video Retrieval
We introduce an interface for efficient video search that exploits the human ability to quickly scan visual content, after automatic retrieval has arrange the images in expected or...
Alexander G. Hauptmann, Wei-Hao Lin, Rong Yan, Jun...
STOC
2007
ACM
101views Algorithms» more  STOC 2007»
16 years 5 months ago
The price of privacy and the limits of LP decoding
This work is at the intersection of two lines of research. One line, initiated by Dinur and Nissim, investigates the price, in accuracy, of protecting privacy in a statistical dat...
Cynthia Dwork, Frank McSherry, Kunal Talwar