Sciweavers

1539 search results - page 260 / 308
» Fast and Simple Methods For Computing Control Points
Sort
View
104
Voted
RTSS
1999
IEEE
15 years 6 months ago
Timing Anomalies in Dynamically Scheduled Microprocessors
Previous timing analysis methods have assumed that the worst-case instruction execution time necessarily corresponds to the worst-case behavior. We show that this assumption is wr...
Thomas Lundqvist, Per Stenström
CIKM
2001
Springer
15 years 6 months ago
Managing Trust in a Peer-2-Peer Information System
Managing trust is a problem of particular importance in peer-to-peer environments where one frequently encounters unknown agents. Existing methods for trust management, that are b...
Karl Aberer, Zoran Despotovic
JEI
2008
128views more  JEI 2008»
15 years 1 months ago
Practical use of receiver operating characteristic analysis to assess the performances of defect detection algorithms
Defect detection in images is a current task in quality control and is often integrated in partially or fully automated systems. Assessing the performances of defect detection algo...
Yann Le Meur, Jean-Michel Vignolle, Jocelyn Chanus...
VLDB
2007
ACM
137views Database» more  VLDB 2007»
15 years 8 months ago
Detecting Attribute Dependencies from Query Feedback
Real-world datasets exhibit a complex dependency structure among the data attributes. Learning this structure is a key task in automatic statistics configuration for query optimi...
Peter J. Haas, Fabian Hueske, Volker Markl
99
Voted
IPMI
2009
Springer
16 years 3 months ago
Inverse-Consistent Surface Mapping With Laplace-Beltrami Eigen-Features
Abstract. We propose in this work a novel variational method for computing maps between surfaces by combining informative geometric features and regularizing forces including inver...
Arthur W. Toga, Jonathan H. Morra, Paul M. Thompso...