Sciweavers

976 search results - page 108 / 196
» Evaluating Adversarial Partitions
Sort
View
PERCOM
2006
ACM
14 years 8 months ago
Adaptive Medical Feature Extraction for Resource Constrained Distributed Embedded Systems
Tiny embedded systems have not been an ideal outfit for high performance computing due to their constrained resources. Limitations in processing power, battery life, communication ...
Roozbeh Jafari, Hyduke Noshadi, Majid Sarrafzadeh,...
CVPR
2010
IEEE
14 years 5 months ago
Naming People from Dialog: Temporal Grouping and Weak Supervision
We address the character identification problem in movies and television videos: assigning names to faces on the screen. Most prior work on person recognition in video assumes s...
Timothee Cour, Benjamin Sapp, Akash Nagle, Ben Tas...
CIDM
2007
IEEE
14 years 3 months ago
Privacy Preserving Burst Detection of Distributed Time Series Data Using Linear Transforms
— In this paper, we consider burst detection within the context of privacy. In our scenario, multiple parties want to detect a burst in aggregated time series data, but none of t...
Lisa Singh, Mehmet Sayal
IEEEPACT
2002
IEEE
14 years 1 months ago
Transparent Threads: Resource Sharing in SMT Processors for High Single-Thread Performance
Simultaneous Multithreading (SMT) processors achieve high processor throughput at the expense of single-thread performance. This paper investigates resource allocation policies fo...
Gautham K. Dorai, Donald Yeung
SIGMOD
1998
ACM
117views Database» more  SIGMOD 1998»
14 years 1 months ago
The Pyramid-Technique: Towards Breaking the Curse of Dimensionality
In this paper, we propose the Pyramid-Technique, a new indexing method for high-dimensional data spaces. The PyramidTechnique is highly adapted to range query processing using the...
Stefan Berchtold, Christian Böhm, Hans-Peter ...