Sciweavers

1407 search results - page 277 / 282
» Cognition without content
Sort
View
118
Voted
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 1 months ago
An In-depth Analysis of Spam and Spammers
Electronic mail services have become an important source of communication for millions of people all over the world. Due to this tremendous growth, there has been a significant in...
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran,...
163
Voted
CIVR
2010
Springer
247views Image Analysis» more  CIVR 2010»
14 years 10 months ago
Coherent bag-of audio words model for efficient large-scale video copy detection
Current content-based video copy detection approaches mostly concentrate on the visual cues and neglect the audio information. In this paper, we attempt to tackle the video copy d...
Yang Liu, Wanlei Zhao, Chong-Wah Ngo, Changsheng X...
249
Voted
MICRO
2011
IEEE
407views Hardware» more  MICRO 2011»
14 years 10 months ago
Thread Cluster Memory Scheduling
In a modern chip-multiprocessor system, memory is a shared resource among multiple concurrently executing threads. The memory scheduling algorithm should resolve memory contention...
Yoongu Kim, Michael Papamichael, Onur Mutlu, Mor H...
142
Voted
BMCBI
2011
14 years 10 months ago
Statistical learning techniques applied to epidemiology: a simulated case-control comparison study with logistic regression
Background: When investigating covariate interactions and group associations with standard regression analyses, the relationship between the response variable and exposure may be ...
John J. Heine, Walker H. Land Jr., Kathleen M. Ega...
146
Voted
TON
2010
136views more  TON 2010»
14 years 10 months ago
Distributed Opportunistic Scheduling With Two-Level Probing
Distributed opportunistic scheduling (DOS) is studied for wireless ad-hoc networks in which many links contend for the channel using random access before data transmissions. Simpl...
P. S. Chandrashekhar Thejaswi, Junshan Zhang, Man-...