Sciweavers

3556 search results - page 602 / 712
» Can machine learning be secure
Sort
View
HPCA
2008
IEEE
14 years 4 months ago
Prediction of CPU idle-busy activity pattern
Real-world workloads rarely saturate multi-core processor. CPU C-states can be used to reduce power consumption during processor idle time. The key unsolved problem is: when and h...
Qian Diao, Justin J. Song
ICDM
2008
IEEE
160views Data Mining» more  ICDM 2008»
14 years 4 months ago
Direct Zero-Norm Optimization for Feature Selection
Zero-norm, defined as the number of non-zero elements in a vector, is an ideal quantity for feature selection. However, minimization of zero-norm is generally regarded as a combi...
Kaizhu Huang, Irwin King, Michael R. Lyu
ICPR
2008
IEEE
14 years 4 months ago
Grading nuclear pleomorphism on histological micrographs
A mainstay in cancer diagnostics is the classification or grading of cell nuclei based on their appearance. While the analysis of cytological samples has been automated successful...
Eric Cosatto, Matthew Miller, Hans Peter Graf, Joh...
ICDIM
2007
IEEE
14 years 4 months ago
Estimating product lifecycle cost using a hybrid approach
It becomes clear for manufacturing companies that product lifecycle cost (LCC) is as crucial as product quality and functionality in deciding the success of a product in the marke...
Haifeng Liu, Vivekanand Gopalkrishnan, Wee Keong N...
TABLETOP
2007
IEEE
14 years 4 months ago
High Precision Multi-touch Sensing on Surfaces using Overhead Cameras
We present a method to enable multi-touch interactions on an arbitrary flat surface using a pair of cameras mounted above the surface. Current systems in this domain mostly make ...
Ankur Agarwal, Shahram Izadi, Manmohan Chandraker,...