Sciweavers

3895 search results - page 686 / 779
» Measuring the effectiveness of ACATS
Sort
View
SAC
2006
ACM
14 years 5 months ago
Detecting identifiable areas in mobile environments
Location-based applications and services are getting increasingly important for mobile users. They take into account a mobile user's current location and provide a location-d...
Jörg Roth
SIGECOM
2006
ACM
107views ECommerce» more  SIGECOM 2006»
14 years 5 months ago
Empirical mechanism design: methods, with application to a supply-chain scenario
Our proposed methods employ learning and search techniques to estimate outcome features of interest as a function of mechanism parameter settings. We illustrate our approach with ...
Yevgeniy Vorobeychik, Christopher Kiekintveld, Mic...
SIGMETRICS
2006
ACM
116views Hardware» more  SIGMETRICS 2006»
14 years 5 months ago
Applying architectural vulnerability Analysis to hard faults in the microprocessor
In this paper, we present a new metric, Hard-Fault Architectural Vulnerability Factor (H-AVF), to allow designers to more effectively compare alternate hard-fault tolerance scheme...
Fred A. Bower, Derek Hower, Mahmut Yilmaz, Daniel ...
SIGMETRICS
2006
ACM
128views Hardware» more  SIGMETRICS 2006»
14 years 5 months ago
Partially overlapped channels not considered harmful
Many wireless channels in different technologies are known to have partial overlap. However, due to the interference effects among such partially overlapped channels, their simult...
Arunesh Mishra, Vivek Shrivastava, Suman Banerjee,...
CVPR
2010
IEEE
14 years 4 months ago
Multi-Target Tracking by On-Line Learned Discriminative Appearance Models
We present an approach for online learning of discriminative appearance models for robust multi-target tracking in a crowded scene from a single camera. Although much progress has...
Cheng-Hao Kuo, Chang Huang, Ram Nevatia