Sciweavers

10435 search results - page 2002 / 2087
» Measuring system normality
Sort
View
ISCA
2009
IEEE
146views Hardware» more  ISCA 2009»
14 years 4 months ago
Multi-execution: multicore caching for data-similar executions
While microprocessor designers turn to multicore architectures to sustain performance expectations, the dramatic increase in parallelism of such architectures will put substantial...
Susmit Biswas, Diana Franklin, Alan Savage, Ryan D...
TRUST
2009
Springer
14 years 4 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi
CIKM
2009
Springer
14 years 4 months ago
Event detection from flickr data through wavelet-based spatial analysis
Detecting events from web resources has attracted increasing research interests in recent years. Our focus in this paper is to detect events from photos on Flickr, an Internet ima...
Ling Chen, Abhishek Roy
CIVR
2009
Springer
253views Image Analysis» more  CIVR 2009»
14 years 4 months ago
Spatial extensions to bag of visual words
The Bag of Visual Words (BoV) paradigm has successfully been applied to image content analysis tasks such as image classification and object detection. The basic BoV approach ove...
Ville Viitaniemi, Jorma Laaksonen
GECCO
2009
Springer
146views Optimization» more  GECCO 2009»
14 years 4 months ago
Analyzing the landscape of a graph based hyper-heuristic for timetabling problems
Hyper-heuristics can be thought of as “heuristics to choose heuristics”. They are concerned with adaptively finding solution methods, rather than directly producing a solutio...
Gabriela Ochoa, Rong Qu, Edmund K. Burke
« Prev « First page 2002 / 2087 Last » Next »