Sciweavers

5675 search results - page 43 / 1135
» Exploiting Chaos for Computation
Sort
View
GRAPHITE
2003
ACM
14 years 4 months ago
Varying rendering fidelity by exploiting human change blindness
The complexity of most virtual environments prevents them being rendered in real time even on modern graphics hardware. Knowledge of the visual system of the user viewing the envi...
Kirsten Cater, Alan Chalmers, Colin Dalton
KDD
2004
ACM
134views Data Mining» more  KDD 2004»
14 years 11 months ago
Exploiting a support-based upper bound of Pearson's correlation coefficient for efficiently identifying strongly correlated pair
Given a user-specified minimum correlation threshold and a market basket database with N items and T transactions, an all-strong-pairs correlation query finds all item pairs with...
Hui Xiong, Shashi Shekhar, Pang-Ning Tan, Vipin Ku...
ICS
2004
Tsinghua U.
14 years 4 months ago
EXPERT: expedited simulation exploiting program behavior repetition
Studying program behavior is a central component in architectural designs. In this paper, we study and exploit one aspect of program behavior, the behavior repetition, to expedite...
Wei Liu, Michael C. Huang
ACSAC
2003
IEEE
14 years 4 months ago
Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs
In-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in combination. The general approach to this problem is to comp...
Steven Noel, Sushil Jajodia, Brian O'Berry, Michae...
WSCG
2004
264views more  WSCG 2004»
14 years 10 days ago
Image Registration Exploiting Five-Point Coplanar Perspective Invariant and Maximum-Curvature Point
Image registrations have been a subject of extensive study over the last decade. They appear in numerous applications including Computer Vision, Pattern Recognition, Medical Image...
Parichart Putjarupong, Chuchart Pintavirooj, Witha...