Sciweavers

575 search results - page 91 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
GECCO
2006
Springer
165views Optimization» more  GECCO 2006»
13 years 11 months ago
Comparing mathematical models on the problem of network inference
In this paper we address the problem of finding gene regulatory networks from experimental DNA microarray data. We focus on the evaluation of the performance of different mathemat...
Christian Spieth, Nadine Hassis, Felix Streichert
GRID
2008
Springer
13 years 8 months ago
Which network measurement tool is right for you? a multidimensional comparison study
Network performance measurement and prediction is one of the most prominent and indispensable components in distributed computing environments. The selection of the most advantage...
Esma Yildirim, Ibrahim H. Suslu, Tevfik Kosar
ICPR
2004
IEEE
14 years 8 months ago
Real-Time Face Detection Using Boosting in Hierarchical Feature Spaces
Boosting-basedmethods have recently led to the state-ofthe-art face detection systems. In these systems, weak classifiers to be boosted are based on simple, local, Haar-like featu...
Daniel Gatica-Perez, Dong Zhang, Stan Z. Li
HIPC
2009
Springer
13 years 5 months ago
Extracting the textual and temporal structure of supercomputing logs
Supercomputers are prone to frequent faults that adversely affect their performance, reliability and functionality. System logs collected on these systems are a valuable resource o...
Sourabh Jain, Inderpreet Singh, Abhishek Chandra, ...
CHI
2003
ACM
14 years 8 months ago
Where on-line meets on the streets: experiences with mobile mixed reality games
We describe two games in which online participants collaborated with mobile participants on the city streets. In the first, the players were online and professional performers wer...
Martin Flintham, Steve Benford, Rob Anastasi, Terr...