Sciweavers

3954 search results - page 688 / 791
» Image-based Model Completion
Sort
View
138
Voted
AUSDM
2007
Springer
173views Data Mining» more  AUSDM 2007»
15 years 8 months ago
The Use of Various Data Mining and Feature Selection Methods in the Analysis of a Population Survey Dataset
This paper reports the results of feature reduction in the analysis of a population based dataset for which there were no specific target variables. All attributes were assessed a...
Ellen Pitt, Richi Nayak
108
Voted
EMSOFT
2007
Springer
15 years 8 months ago
Buffer optimization and dispatching scheme for embedded systems with behavioral transparency
Software components are modular and can enable post-deployment update, but their high overhead in runtime and memory is prohibitive for many embedded systems. This paper proposes ...
Jiwon Hahn, Pai H. Chou
MOBICOM
2006
ACM
15 years 8 months ago
Analysis and implications of student contact patterns derived from campus schedules
Characterizing mobility or contact patterns in a campus environment is of interest for a variety of reasons. Existing studies of these patterns can be classified into two basic a...
Vikram Srinivasan, Mehul Motani, Wei Tsang Ooi
VALUETOOLS
2006
ACM
167views Hardware» more  VALUETOOLS 2006»
15 years 8 months ago
Detailed cache simulation for detecting bottleneck, miss reason and optimization potentialities
Cache locality optimization is an efficient way for reducing the idle time of modern processors in waiting for needed data. This kind of optimization can be achieved either on the...
Jie Tao, Wolfgang Karl
127
Voted
CRYPTO
2005
Springer
125views Cryptology» more  CRYPTO 2005»
15 years 8 months ago
Secure Computation Without Authentication
In the setting of secure multiparty computation, a set of parties wish to jointly compute some function of their inputs. Such a computation must preserve certain security propertie...
Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pa...