Minimizing the number of computations a low-power device makes is important to achieve long battery life. In this paper we present a framework for a low-power device to minimize t...
Publishing a database instance containing individual information poses two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals in (...
This paper proposes an original model of the execution time of assembly instructions in superscalar architectures. The approach is based on a rigorous mathematical model and provi...
William Fornaciari, Vito Trianni, Carlo Brandolese...
In this paper, we propose a novel technique for modelbased recognition of complex object motion trajectories using Gaussian Mixture Models (GMM). We build our models on Principal ...
Faisal I. Bashir, Ashfaq A. Khokhar, Dan Schonfeld
This paper studies the effect of covariance regularization for classific ation of high-dimensional data. This is done by fitting a mixture of Gaussians with a regularized covaria...
Daniel L. Elliott, Charles W. Anderson, Michael Ki...