Sciweavers

10458 search results - page 1853 / 2092
» Modeling Features at Runtime
Sort
View
PATMOS
2004
Springer
14 years 2 months ago
Sleepy Stack Reduction of Leakage Power
Leakage power consumption of current CMOS technology is already a great challenge. ITRS projects that leakage power consumption may come to dominate total chip power consumption as...
Jun-Cheol Park, Vincent John Mooney III, Philipp P...
PKDD
2004
Springer
131views Data Mining» more  PKDD 2004»
14 years 2 months ago
Asynchronous and Anticipatory Filter-Stream Based Parallel Algorithm for Frequent Itemset Mining
Abstract In this paper we propose a novel parallel algorithm for frequent itemset mining. The algorithm is based on the filter-stream programming model, in which the frequent item...
Adriano Veloso, Wagner Meira Jr., Renato Ferreira,...
WEBDB
2004
Springer
143views Database» more  WEBDB 2004»
14 years 2 months ago
DTDs versus XML Schema: A Practical Study
Among the various proposals answering the shortcomings of Document Type Definitions (DTDs), XML Schema is the most widely used. Although DTDs and XML Schema Defintions (XSDs) di...
Geert Jan Bex, Frank Neven, Jan Van den Bussche
3DIM
2003
IEEE
14 years 2 months ago
Stable Real-Time Interaction Between Virtual Humans And Real Scenes
We present an Augmented Reality system that relies on purely passive techniques to solve the real-time registration problem. It can run on a portable PC and does not require engin...
Luca Vacchetti, Vincent Lepetit, George Papagianna...
ACSAC
2003
IEEE
14 years 2 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
« Prev « First page 1853 / 2092 Last » Next »