Sciweavers

236 search results - page 9 / 48
» How Can Intra Correlation Be Exploited Better
Sort
View
PAKDD
2004
ACM
127views Data Mining» more  PAKDD 2004»
14 years 21 days ago
Exploiting Recurring Usage Patterns to Enhance Filesystem and Memory Subsystem Performance
In many cases, normal uses of a system form patterns that will repeat. The most common patterns can be collected into a prediction model which will essentially predict that usage p...
Benjamin Rutt, Srinivasan Parthasarathy
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
13 years 11 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
MASCOTS
2010
13 years 5 months ago
Cluster-Based Correlated Data Gathering in Wireless Sensor Networks
—We consider the problem of optimal cluster-based data gathering in Wireless Sensor Networks (WSNs) when nearby readings are spatially correlated. Due to the dense nature of WSNs...
Ali Dabirmoghaddam, Majid Ghaderi, Carey L. Willia...
RECOMB
2009
Springer
14 years 8 months ago
How Many Bootstrap Replicates Are Necessary?
Phylogenetic Bootstrapping (BS) is a standard technique for inferring confidence values on phylogenetic trees that is based on reconstructing many trees from minor variations of th...
Nicholas D. Pattengale, Masoud Alipour, Olaf R. P....
JVCIR
2006
121views more  JVCIR 2006»
13 years 7 months ago
An extension of direct macroblock coding in Predictive (P) slices of the H.264 standard
The consideration of better motion compensation techniques for inter-frame prediction is one of the key reasons why the new H.264 (MPEG-4 AVC) video coding standard can achieve co...
Alexis M. Tourapis, Feng Wu, Shipeng Li