Sciweavers

351 search results - page 70 / 71
» Generating Java trace data
Sort
View
TIFS
2008
148views more  TIFS 2008»
13 years 7 months ago
Digital Image Forensics via Intrinsic Fingerprints
Digital imaging has experienced tremendous growth in recent decades, and digital camera images have been used in a growing number of applications. With such increasing popularity a...
Ashwin Swaminathan, Min Wu, K. J. Ray Liu
JSA
2000
116views more  JSA 2000»
13 years 7 months ago
Distributed vector architectures
Integrating processors and main memory is a promising approach to increase system performance. Such integration provides very high memory bandwidth that can be exploited efficientl...
Stefanos Kaxiras
TC
2002
13 years 7 months ago
UCFS-A Novel User-Space, High Performance, Customized File System for Web Proxy Servers
Web proxy caching servers play a key role in today's Web infrastructure. Previous studies have shown that disk I/O is one of the major performance bottlenecks of proxy server...
Jun Wang, Rui Min, Yingwu Zhu, Yiming Hu
DIALM
2010
ACM
194views Algorithms» more  DIALM 2010»
13 years 5 months ago
Prioritized gossip in vehicular networks
We present a method for using real world mobility traces to identify tractable theoretical models for the study of distributed algorithms in mobile networks. We validate the metho...
Alejandro Cornejo, Calvin C. Newport
ICDCS
2012
IEEE
11 years 9 months ago
NEAT: Road Network Aware Trajectory Clustering
—Mining trajectory data has been gaining significant interest in recent years. However, existing approaches to trajectory clustering are mainly based on density and Euclidean di...
Binh Han, Ling Liu, Edward Omiecinski