Sciweavers

715 search results - page 80 / 143
» An Analysis of Performance Interference Effects in Virtual E...
Sort
View
WSCG
2003
188views more  WSCG 2003»
13 years 10 months ago
Camera Self-Calibration in Underwater Environment
This paper presents a self-calibration technique for a camera mounted on an underwater vehicle designed to perform the 3D reconstruction of underwater scenes. Our aim is to identi...
N. Pessel, Jan Opderbecke, Marie-José Aldon
MASCOTS
2007
13 years 10 months ago
Analysis of Core-Assisted Routing in Opportunistic Networks
Abstract— Opportunistic Networks (ONs) are a newly emerging type of Delay Tolerant Network (DTN) systems that opportunistically exploit unplanned contacts among nodes to share in...
Muhammad Abdulla, Robert Simon
VIROLOGY
2008
104views more  VIROLOGY 2008»
13 years 8 months ago
Malware behaviour analysis
Several malware analysis techniques suppose that the disassembled code of a piece of malware is available, which is however not always possible. This paper proposes a flexible and ...
Gérard Wagener, Radu State, Alexandre Dulau...
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
14 years 3 months ago
Outlier Detection for Fine-grained Load Balancing in Database Clusters
Recent industry trends towards reducing the costs of ownership in large data centers emphasize the need for database system techniques for both automatic performance tuning and ef...
Jin Chen, Gokul Soundararajan, Madalin Mihailescu,...
KDD
2000
ACM
142views Data Mining» more  KDD 2000»
14 years 9 days ago
Automating exploratory data analysis for efficient data mining
Having access to large data sets for the purpose of predictive data mining does not guarantee good models, even when the size of the training data is virtually unlimited. Instead,...
Jonathan D. Becher, Pavel Berkhin, Edmund Freeman