Sciweavers

2028 search results - page 326 / 406
» Highly Predictive Blacklisting
Sort
View
130
Voted
AISS
2010
125views more  AISS 2010»
15 years 27 days ago
A Dual-Mode Intelligent Shopping Assistant
"Radio Frequency Identification" (RFID) promises to enable an automatic collection of shopping data for business intelligent purposes. Three important components of inte...
Lilac A. E. Al-Safadi
142
Voted
IPPS
2010
IEEE
15 years 21 days ago
A simple thermal model for multi-core processors and its application to slack allocation
Abstract--Power density and heat density of multicore processor system are increasing exponentially with Moore's Law. High temperature on chip greatly affects its reliability,...
Zhe Wang, Sanjay Ranka
137
Voted
CVPR
2011
IEEE
14 years 11 months ago
Extracting and Locating Temporal Motifs in Video Scenes Using a Hierarchical Non Parametric Bayesian Model
In this paper, we present an unsupervised method for mining activities in videos. From unlabeled video sequences of a scene, our method can automatically recover what are the recu...
Ré, mi Emonet, Jagannadan Varadarajan, Jean-Marc ...
CORR
2011
Springer
188views Education» more  CORR 2011»
14 years 10 months ago
Robust Matrix Completion with Corrupted Columns
This paper considers the problem of matrix completion, when some number of the columns are arbitrarily corrupted, potentially by a malicious adversary. It is well-known that stand...
Yudong Chen, Huan Xu, Constantine Caramanis, Sujay...
153
Voted
FGCS
2011
149views more  FGCS 2011»
14 years 10 months ago
Adaptive resource provisioning for read intensive multi-tier applications in the cloud
A Service-Level Agreement (SLA) provides surety for specific quality attributes to the consumers of services. However, current SLAs offered by cloud infrastructure providers do ...
Waheed Iqbal, Matthew N. Dailey, David Carrera, Pa...