Sciweavers

2421 search results - page 50 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
LCTRTS
2007
Springer
14 years 5 months ago
Integrated CPU and l2 cache voltage scaling using machine learning
Embedded systems serve an emerging and diverse set of applications. As a result, more computational and storage capabilities are added to accommodate ever more demanding applicati...
Nevine AbouGhazaleh, Alexandre Ferreira, Cosmin Ru...
SP
2010
IEEE
174views Security Privacy» more  SP 2010»
14 years 2 months ago
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
— Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and introspecting commodity OSes as virtual machines (VMs) ha...
Zhi Wang, Xuxian Jiang
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
14 years 5 months ago
Video Database Modeling and Temporal Pattern Retrieval using Hierarchical Markov Model Mediator
The dream of pervasive multimedia retrieval and reuse will not be realized without incorporating semantics in the multimedia database. As video data is penetrating many informatio...
Na Zhao, Shu-Ching Chen, Mei-Ling Shyu
ICDE
2000
IEEE
189views Database» more  ICDE 2000»
15 years 10 days ago
Image Database Retrieval with Multiple-Instance Learning Techniques
In this paper, we develop and test an approach to retrieving images from an image database based on content similarity. First, each picture is divided into many overlapping region...
Cheng Yang, Tomás Lozano-Pérez
PR
2002
140views more  PR 2002»
13 years 10 months ago
Negotiating the semantic gap: from feature maps to semantic landscapes
In this paper, we present the results of a project that seeks to transform low-level features to a higher level of meaning. This project concerns a technique, latent semantic inde...
Rong Zhao, William I. Grosky