BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
use (7)
zero (4)
base (4)
bdds (3)
maximum (3)

Stem suppress$ (all stems)

32 papers:

CASECASE-2015-TsaiCLT #modelling
Dynamic modeling and vibration suppression of the feed drive system (MST, SJC, CCL, PYT), pp. 106–110.
ICEISICEIS-v2-2014-SamejimaMK #flexibility #resource management
Flexible Peak Shaving in Data Center by Suppression of Application Resource Usage (MS, HTM, NK), pp. 355–360.
ICPRICPR-2014-BrizziGSS #video
Optical Flow Based Expression Suppression in Video (JB, DBG, SS, MS), pp. 1817–1821.
ICPRICPR-2014-BrownFP #detection #self #using
Temporal Non-maximum Suppression for Pedestrian Detection Using Self-Calibration (LMGB, RSF, SP), pp. 2239–2244.
HPCAHPCA-2014-FletcherRYDKD #information management #performance #ram #trade-off
Suppressing the Oblivious RAM timing channel while making information leakage and program efficiency trade-offs (CWF, LR, XY, MvD, OK, SD), pp. 213–224.
SIGMODSIGMOD-2013-WangHRN
Utility-maximizing event stream suppression (DW, YH, EAR, JFN), pp. 589–600.
HCIHCI-III-2013-NovotnyPSP
The Solid Angle of Light Sources and Its Impact on the Suppression of Melatonin in Humans (PN, PP, MJS, HP), pp. 454–463.
CASECASE-2012-Moon
Input shaping control for suppression of boom vibrations (KSM), pp. 782–785.
SIGMODSIGMOD-2012-Zhang0D #enterprise
Aggregate suppression for enterprise search engines (MZ, NZ, GD), pp. 469–480.
HILTHILT-2012-EilersK #adaptation #runtime
Adapting ACATS for use with run-time checks suppressed (DE, TK), pp. 97–102.
ICPRICPR-2012-BaradaraniWA #invariant #recognition
Illumination suppression for illumination invariant face recognition (AB, QMJW, MA), pp. 1590–1593.
ICPRICPR-2012-ChenS #multi
Bone suppression in chest radiographs by means of anatomically specific multiple massive-training ANNs (SC, KS), pp. 17–20.
ICPRICPR-2012-ZhangXY #bound #detection #modelling
An improved surround suppression model based on orientation contrast for boundary detection (HZ, BX, JY), pp. 3086–3089.
VLDBVLDB-2011-Jin0MD #database #random #web
Randomized Generalization for Aggregate Suppression Over Hidden Web Databases (XJ, NZ, AM, GD), pp. 1099–1110.
ICSMEICSM-2008-JeffreyGG #debugging #identification #memory management #using
Identifying the root causes of memory bugs using corrupted memory location suppression (DJ, NG, RG), pp. 356–365.
CIKMCIKM-2008-CarvalhoECC #ranking
Suppressing outliers in pairwise preference ranking (VRC, JLE, WWC, JGC), pp. 1487–1488.
VLDBVLDB-2007-SilbersteinGMPY #approach
Making Sense of Suppressions and Failures in Sensor Data: A Bayesian Approach (AS, AEG, KM, GP, JY), pp. 842–853.
HCIHCI-AS-2007-ChoK #collaboration #contest #learning
Suppressing Competition in a Computer-Supported Collaborative Learning System (KC, BK), pp. 208–214.
CASECASE-2006-ZhangA #functional #simulation
Tremor Suppression of Elbow Joint via Functional Electrical Stimulation: A Simulation Study (DZ, WTA), pp. 182–187.
ICPRICPR-v2-2006-SunV #detection #linear #multi #performance #using
Fast Linear Feature Detection Using Multiple Directional Non-Maximum Suppression (CS, PV), pp. 288–291.
ICPRICPR-v3-2006-NeubeckG #performance
Efficient Non-Maximum Suppression (AN, LJVG), pp. 850–855.
KDDKDD-2006-LoekitoB #diagrams #mining #performance #using
Fast mining of high dimensional expressive contrast patterns using zero-suppressed binary decision diagrams (EL, JB), pp. 307–316.
KDDKDD-2006-WangYPYY #concept #data type #mining
Suppressing model overfitting in mining concept-drifting data streams (HW, JY, JP, PSY, JXY), pp. 736–741.
ICPRICPR-v1-2004-SoaresM #analysis
Watershed Lines Suppression by Waterfall Marker Improvement and Line-Neighbourhood Analysis (FS, FM), pp. 604–607.
SACSAC-2004-DaescuJRS #deployment #multi #reliability
Optimal placement of NAK-suppressing agents for reliable multicast: a partial deployment case (OD, RJ, BR, KS), pp. 334–338.
DATEDATE-2002-AloulMS #satisfiability #search-based #using
Search-Based SAT Using Zero-Suppressed BDDs (FAA, MNM, KAS), p. 1082.
ICPRICPR-v2-2002-BaekD #analysis
Factor Analysis or Background Suppression (KB, BAD), pp. 643–646.
DACDAC-1994-Minato #algebra #set #using
Calculation of Unate Cube Set Algebra Using Zero-Suppressed BDDs (SiM), pp. 420–424.
DACDAC-1993-Minato #combinator #problem #set
Zero-Suppressed BDDs for Set Manipulation in Combinatorial Problems (SiM), pp. 272–277.
PODSPODS-1991-MalvestutoMR #2d #information management #statistics
Suppressing Marginal Cells to Protect Sensitive Information in a Two-Dimensional Statistical Table (FMM, MM, MR), pp. 252–258.
DACDAC-1988-TakamineMNMK #algorithm #development
Clock Event Suppression Algorithm of VELVET and Its Application to S-820 Development (YT, SM, SN, MM, SK), pp. 716–719.
DACDAC-1983-Ulrich #concurrent #design #simulation #verification
A design verification methodology based on concurrent simulation and clock suppression (EU), pp. 709–712.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.