Sciweavers

2028 search results - page 326 / 406
» Highly Predictive Blacklisting
Sort
View
AISS
2010
125views more  AISS 2010»
13 years 5 months ago
A Dual-Mode Intelligent Shopping Assistant
"Radio Frequency Identification" (RFID) promises to enable an automatic collection of shopping data for business intelligent purposes. Three important components of inte...
Lilac A. E. Al-Safadi
IPPS
2010
IEEE
13 years 5 months ago
A simple thermal model for multi-core processors and its application to slack allocation
Abstract--Power density and heat density of multicore processor system are increasing exponentially with Moore's Law. High temperature on chip greatly affects its reliability,...
Zhe Wang, Sanjay Ranka
CVPR
2011
IEEE
13 years 4 months ago
Extracting and Locating Temporal Motifs in Video Scenes Using a Hierarchical Non Parametric Bayesian Model
In this paper, we present an unsupervised method for mining activities in videos. From unlabeled video sequences of a scene, our method can automatically recover what are the recu...
Ré, mi Emonet, Jagannadan Varadarajan, Jean-Marc ...
CORR
2011
Springer
188views Education» more  CORR 2011»
13 years 2 months ago
Robust Matrix Completion with Corrupted Columns
This paper considers the problem of matrix completion, when some number of the columns are arbitrarily corrupted, potentially by a malicious adversary. It is well-known that stand...
Yudong Chen, Huan Xu, Constantine Caramanis, Sujay...
FGCS
2011
149views more  FGCS 2011»
13 years 2 months ago
Adaptive resource provisioning for read intensive multi-tier applications in the cloud
A Service-Level Agreement (SLA) provides surety for specific quality attributes to the consumers of services. However, current SLAs offered by cloud infrastructure providers do ...
Waheed Iqbal, Matthew N. Dailey, David Carrera, Pa...