Sciweavers

7596 search results - page 1513 / 1520
» Challenges in forensic computing
Sort
View
ISCA
2011
IEEE
240views Hardware» more  ISCA 2011»
13 years 1 months ago
Virtualizing performance asymmetric multi-core systems
Performance-asymmetric multi-cores consist of heterogeneous cores, which support the same ISA, but have different computing capabilities. To maximize the throughput of asymmetric...
Youngjin Kwon, Changdae Kim, Seungryoul Maeng, Jae...
MMM
2011
Springer
244views Multimedia» more  MMM 2011»
13 years 1 months ago
Shape Stylized Face Caricatures
Facial caricatures exaggerate key features to emphasize unique structural and personality traits. It is quite a challenge to retain the identity of the original person despite the ...
Nguyen Kim Hai Le, Why Yong Peng, Golam Ashraf
AIPS
2011
13 years 1 months ago
Planning and Acting in Incomplete Domains
Engineering complete planning domain descriptions is often very costly because of human error or lack of domain knowledge. Learning complete domain descriptions is also very chall...
Christopher Weber, Daniel Bryce
BMCBI
2011
13 years 1 months ago
PhyloMap: an algorithm for visualizing relationships of large sequence data sets and its application to the influenza A virus ge
Background: Results of phylogenetic analysis are often visualized as phylogenetic trees. Such a tree can typically only include up to a few hundred sequences. When more than a few...
Jiajie Zhang, Amir Madany Mamlouk, Thomas Martinet...
INFOCOM
2011
IEEE
13 years 1 months ago
Finite-horizon energy allocation and routing scheme in rechargeable sensor networks
Abstract—In this paper, we investigate the problem of maximizing the throughput over a finite-horizon time period for a sensor network with energy replenishment. The finite-horiz...
Shengbo Chen, Prasun Sinha, Ness B. Shroff, Changh...
« Prev « First page 1513 / 1520 Last » Next »