Sciweavers

24529 search results - page 4772 / 4906
» Computing on Authenticated Data
Sort
View
128
Voted
EMSOFT
2007
Springer
15 years 8 months ago
Exploiting non-volatile RAM to enhance flash file system performance
Non-volatile RAM (NVRAM) such as PRAM (Phase-change RAM), FeRAM (Ferroelectric RAM), and MRAM (Magnetoresistive RAM) has characteristics of both non-volatile storage and random ac...
In Hwan Doh, Jongmoo Choi, Donghee Lee, Sam H. Noh
126
Voted
GECCO
2007
Springer
162views Optimization» more  GECCO 2007»
15 years 8 months ago
Some novel locality results for the blob code spanning tree representation
The Blob Code is a bijective tree code that represents each tree on n labelled vertices as a string of n − 2 vertex labels. In recent years, several researchers have deployed th...
Tim Paulden, David K. Smith
148
Voted
GECCO
2007
Springer
214views Optimization» more  GECCO 2007»
15 years 8 months ago
Portfolio allocation using XCS experts in technical analysis, market conditions and options market
Schulenburg [15] first proposed the idea to model different trader types by supplying different input information sets to a group of homogenous LCS agent. Gershoff [12] investigat...
Sor Ying (Byron) Wong, Sonia Schulenburg
148
Voted
ICCS
2007
Springer
15 years 8 months ago
Dynamic Tracking of Facial Expressions Using Adaptive, Overlapping Subspaces
We present a Dynamic Data Driven Application System (DDDAS) to track 2D shapes across large pose variations by learning non-linear shape manifold as overlapping, piecewise linear s...
Dimitris N. Metaxas, Atul Kanaujia, Zhiguo Li
132
Voted
ICN
2007
Springer
15 years 8 months ago
CoLoRaDe: A Novel Algorithm for Controlling Long-Range Dependent Network Traffic
Long-range dependence characteristics have been observed in many natural or physical phenomena. In particular, a significant impact on data network performance has been shown in se...
Karim Mohammed Rezaul, Vic Grout
« Prev « First page 4772 / 4906 Last » Next »