Sciweavers

180 search results - page 21 / 36
» How Thorough Is Thorough Enough
Sort
View
ICS
1999
Tsinghua U.
13 years 11 months ago
Low-level router design and its impact on supercomputer system performance
Supercomputer performance is highly dependent on its interconnection subsystem design. In this paper we study how di erent architectural approaches for router design impact into s...
Valentin Puente, José A. Gregorio, Cruz Izu...
ICSE
1999
IEEE-ACM
13 years 11 months ago
A Practical Method for Verifying Event-Driven Software
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
Gerard J. Holzmann, Margaret H. Smith
ICPR
2010
IEEE
13 years 10 months ago
Crossmodal Matching of Speakers Using Lip and Voice Features in Temporally Non-Overlapping Audio and Video Streams
Person identification using audio (speech) and visual (facial appearance, static or dynamic) modalities, either independently or jointly, is a thoroughly investigated problem in pa...
Anindya Roy, Sebastien Marcel
AAAI
2007
13 years 9 months ago
Cautious Inference in Collective Classification
Collective classification can significantly improve accuracy by exploiting relationships among instances. Although several collective inference procedures have been reported, they...
Luke McDowell, Kalyan Moy Gupta, David W. Aha
CONEXT
2008
ACM
13 years 9 months ago
Internet traffic classification demystified: myths, caveats, and the best practices
Recent research on Internet traffic classification algorithms has yielded a flurry of proposed approaches for distinguishing types of traffic, but no systematic comparison of the ...
Hyunchul Kim, Kimberly C. Claffy, Marina Fomenkov,...