Sciweavers

977 search results - page 182 / 196
» An Algebraic Approach to Data Mining: Some Examples
Sort
View
CSMR
2010
IEEE
13 years 1 months ago
Using Architecturally Significant Requirements for Guiding System Evolution
Rapidly changing technology is one of the key triggers of system evolution. Some examples are: physically relocating a data center; replacement of infrastructure such as migrating ...
Ipek Ozkaya, J. Andrés Díaz Pace, Ar...
ICASSP
2011
IEEE
12 years 10 months ago
Sparsity-based defect pixel compensation for arbitrary camera raw images
In high quality imaging even tiny distortions as small as a single pixel are visible and can not be accepted. Although the production quality of CMOS image sensors is very high, f...
Michael Schöberl, Jürgen Seiler, Bernhar...
DSN
2011
IEEE
12 years 6 months ago
Resource and virtualization costs up in the cloud: Models and design choices
—Virtualization offers the potential for cost-effective service provisioning. For service providers who make significant investments in new virtualized data centers in support of...
Daniel Gmach, Jerry Rolia, Ludmila Cherkasova
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
13 years 10 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
CSSC
2008
110views more  CSSC 2008»
13 years 6 months ago
Bayesian False Discovery Rate Wavelet Shrinkage: Theory and Applications
The interest in inference in the wavelet domain remains vibrant area of statistical research because of needs of scientific community to process and explore massive data sets. Prim...
Ilya Lavrik, Yoon Young Jung, Fabrizio Ruggeri, Br...