Sciweavers

17789 search results - page 3555 / 3558
» Exceptional Use Cases
Sort
View
CIARP
2007
Springer
14 years 1 months ago
A Method for Estimating Authentication Performance over Time, with Applications to Face Biometrics
Underlying biometrics are biological tissues that evolve over time. Hence, biometric authentication (and recognition in general) is a dynamic pattern recognition problem. We propos...
Norman Poh, Josef Kittler, Raymond S. Smith, Jose ...
ISBI
2004
IEEE
14 years 8 months ago
Volumetric Harmonic Brain Mapping
Brain surface conformal mapping research has been successful and this motivates our more general investigation of 3D volumetric brain harmonic mapping. By transforming the full 3D...
Yalin Wang, Xianfeng Gu, Tony F. Chan, Paul M. Tho...
WWW
2005
ACM
14 years 8 months ago
A multi-threaded PIPELINED Web server architecture for SMP/SoC machines
Design of high performance Web servers has become a recent research thrust to meet the increasing demand of networkbased services. In this paper, we propose a new Web server archi...
Gyu Sang Choi, Jin-Ha Kim, Deniz Ersoz, Chita R. D...
KDD
2007
ACM
149views Data Mining» more  KDD 2007»
14 years 8 months ago
Distributed classification in peer-to-peer networks
This work studies the problem of distributed classification in peer-to-peer (P2P) networks. While there has been a significant amount of work in distributed classification, most o...
Ping Luo, Hui Xiong, Kevin Lü, Zhongzhi Shi
ICS
2009
Tsinghua U.
14 years 2 months ago
Less reused filter: improving l2 cache performance via filtering less reused lines
The L2 cache is commonly managed using LRU policy. For workloads that have a working set larger than L2 cache, LRU behaves poorly, resulting in a great number of less reused lines...
Lingxiang Xiang, Tianzhou Chen, Qingsong Shi, Wei ...
« Prev « First page 3555 / 3558 Last » Next »