Sciweavers

SAC
2008
ACM
13 years 11 months ago
Mining fault-tolerant frequent patterns efficiently with powerful pruning
The mining of frequent patterns in databases has been studied for several years. However, the real-world data tends to be dirty and frequent pattern mining which extracts patterns...
Jhih-Jie Zeng, Guanling Lee, Chung-Chi Lee
SAC
2008
ACM
13 years 11 months ago
IELR(1): practical LR(1) parser tables for non-LR(1) grammars with conflict resolution
There has been a recent effort in the literature to reconsider grammar-dependent software development from an engineering point of view. As part of that effort, we examine a defic...
Joel E. Denny, Brian A. Malloy
SAC
2008
ACM
13 years 11 months ago
A remote display system for Java-based mobile applications
Remote presentation is an interesting model for executing applications in mobile devices, since applications can be executed on a server and their interfaces displayed on mobile c...
Andre Luiz Camargos Tavares, Marco Tulio de Olivei...
SAC
2008
ACM
13 years 11 months ago
Trajectory retrieval with latent semantic analysis
The problem of trajectory similarity has been recently attracted research interest considerably, due to its importance in diverse fields. In this work, we study trajectory similar...
Apostolos N. Papadopoulos
SAC
2008
ACM
13 years 11 months ago
An approach to mobile collaborative mapping
Chien Jon Soon, Paul Roe, Dian Tjondronegoro
SAC
2008
ACM
13 years 11 months ago
Optimizing code through iterative specialization
Code specialization is a way to obtain significant improvement in the performance of an application. It works by exposing values of different parameters in source code. The availa...
Minhaj Ahmad Khan, Henri-Pierre Charles, Denis Bar...
SAC
2008
ACM
13 years 11 months ago
Filtering drowsy instruction cache to achieve better efficiency
Leakage power in cache memories represents a sizable fraction of total power consumption, and many techniques have been proposed to reduce it. As a matter of fact, during a fixed ...
Roberto Giorgi, Paolo Bennati
SAC
2008
ACM
13 years 11 months ago
Spatial vagueness and imprecision in databases
The impossibility of current spatial database systems and GIS to handle spatial vagueness and imprecision has been recognized as an important problem in the spatial database domai...
Alejandro Pauly, Markus Schneider
SAC
2008
ACM
13 years 11 months ago
Improving denial of service resistance using dynamic local adaptations
We improve the resistance of gossip-based multicast to (Distributed) Denial of Service (DoS) attacks using dynamic local adaptations at each node. Each node estimates the current ...
Gal Badishi, Idit Keidar
SAC
2008
ACM
13 years 11 months ago
Power-efficient and scalable load/store queue design via address compression
This paper proposes an address compression technique for load/store queue (LSQ) to improve the scalability and power efficiency. A load/store queue (LSQ) typically needs a fullyas...
Yi-Ying Tsai, Chia-Jung Hsu, Chung-Ho Chen