Sciweavers

1277 search results - page 97 / 256
» An Evaluation Approach for Dynamics-Aware Applications Using...
Sort
View
ASPLOS
2008
ACM
13 years 11 months ago
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
Commodity operating systems entrusted with securing sensitive data are remarkably large and complex, and consequently, frequently prone to compromise. To address this limitation, ...
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis,...
CVPR
2012
IEEE
11 years 11 months ago
Multi-view latent variable discriminative models for action recognition
Many human action recognition tasks involve data that can be factorized into multiple views such as body postures and hand shapes. These views often interact with each other over ...
Yale Song, Louis-Philippe Morency, Randall Davis
WOWMOM
2009
ACM
165views Multimedia» more  WOWMOM 2009»
14 years 3 months ago
Demonstration of channel assignment in a wireless metropolitan MESH network
We demonstrate the channel assignment in a metropolitan wireless multi-radio mesh network with directional antennas. A channel assignment approach is presented using suitable algo...
Nikos Petroulakis, Manolis Delakis, Manolis Genetz...
PVM
2005
Springer
14 years 2 months ago
Cooperative Write-Behind Data Buffering for MPI I/O
Many large-scale production parallel programs often run for a very long time and require data checkpoint periodically to save the state of the computation for program restart and/o...
Wei-keng Liao, Kenin Coloma, Alok N. Choudhary, Le...
CEC
2010
IEEE
13 years 10 months ago
Two novel Ant Colony Optimization approaches for Bayesian network structure learning
Learning Bayesian networks from data is an N-P hard problem with important practical applications. Several researchers have designed algorithms to overcome the computational comple...
Yanghui Wu, John A. W. McCall, David W. Corne