Sciweavers

1317 search results - page 258 / 264
» A New Design for a Practical Secure Cookies System
Sort
View
IISWC
2006
IEEE
14 years 2 months ago
Comparing Benchmarks Using Key Microarchitecture-Independent Characteristics
— Understanding the behavior of emerging workloads is important for designing next generation microprocessors. For addressing this issue, computer architects and performance anal...
Kenneth Hoste, Lieven Eeckhout
VRST
2005
ACM
14 years 2 months ago
Artistic reality: fast brush stroke stylization for augmented reality
The goal of augmented reality is to provide the user with a view of the surroundings enriched by virtual objects. Practically all augmented reality systems rely on standard realti...
Jan Fischer, Dirk Bartz, Wolfgang Straßer
CLOUD
2010
ACM
14 years 1 months ago
Virtual machine power metering and provisioning
Virtualization is often used in cloud computing platforms for its several advantages in efficiently managing resources. However, virtualization raises certain additional challeng...
Aman Kansal, Feng Zhao, Jie Liu, Nupur Kothari, Ar...
EOR
2007
165views more  EOR 2007»
13 years 8 months ago
Adaptive credit scoring with kernel learning methods
Credit scoring is a method of modelling potential risk of credit applications. Traditionally, logistic regression, linear regression and discriminant analysis are the most popular...
Yingxu Yang
CN
1998
207views more  CN 1998»
13 years 8 months ago
The Anatomy of a Large-Scale Hypertextual Web Search Engine
In this paper, we present Google, a prototype of a large-scale search engine which makes heavy use of the structure present in hypertext. Google is designed to crawl and index the...
Sergey Brin, Lawrence Page