Sciweavers

969 search results - page 65 / 194
» Generalized matching from theory to application
Sort
View
LCTRTS
2010
Springer
14 years 2 months ago
Cache vulnerability equations for protecting data in embedded processor caches from soft errors
Continuous technology scaling has brought us to a point, where transistors have become extremely susceptible to cosmic radiation strikes, or soft errors. Inside the processor, cac...
Aviral Shrivastava, Jongeun Lee, Reiley Jeyapaul
DGO
2011
247views Education» more  DGO 2011»
12 years 9 months ago
Open government and e-government: democratic challenges from a public value perspective
We consider open government (OG) within the context of egovernment and its broader implications for the future of public administration. We argue that the current US Administratio...
Teresa M. Harrison, Santiago Guerrero, G. Brian Bu...
WSDM
2012
ACM
304views Data Mining» more  WSDM 2012»
12 years 4 months ago
Beyond co-occurrence: discovering and visualizing tag relationships from geo-spatial and temporal similarities
Studying relationships between keyword tags on social sharing websites has become a popular topic of research, both to improve tag suggestion systems and to discover connections b...
Haipeng Zhang, Mohammed Korayem, Erkang You, David...
MM
2010
ACM
162views Multimedia» more  MM 2010»
13 years 9 months ago
Interactive visual object search through mutual information maximization
Searching for small objects (e.g., logos) in images is a critical yet challenging problem. It becomes more difficult when target objects differ significantly from the query object...
Jingjing Meng, Junsong Yuan, Yuning Jiang, Nitya N...
ESM
1998
13 years 10 months ago
On Hybrid Combination of Queueing and Simulation
This paper aims to and illustrate that simulation and queuing theory can and should go hand in hand for a variety of practical problems, both in daily-life and industry, which are...
Nico M. van Dijk