Sciweavers

1548 search results - page 271 / 310
» Performance evaluation and optimization of human control str...
Sort
View
ICPADS
2005
IEEE
14 years 4 months ago
I/O Processor Allocation for Mesh Cluster Computers
As cluster systems become increasingly popular, more and more parallel applications require need not only computing power but also significant I/O performance. However, the I/O s...
Pangfeng Liu, Chun-Chen Hsu, Jan-Jan Wu
MUM
2005
ACM
164views Multimedia» more  MUM 2005»
14 years 4 months ago
PhoneGuide: museum guidance supported by on-device object recognition on mobile phones
We present PhoneGuide – an enhanced museum guidance approach that uses camera-equipped mobile phones and on-device object recognition. Our main technical achievement is a simple...
Paul Föckler, Thomas Zeidler, Benjamin Bromba...
JNCA
2011
137views more  JNCA 2011»
13 years 5 months ago
Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks
Built upon a shared wireless medium, wireless mesh network is particularly vulnerable to jamming attacks. The ability to recover from attacks and maintain an acceptable level of s...
Shanshan Jiang, Yuan Xue
BMCBI
2008
170views more  BMCBI 2008»
13 years 11 months ago
A genetic approach for building different alphabets for peptide and protein classification
Background: In this paper, it is proposed an optimization approach for producing reduced alphabets for peptide classification, using a Genetic Algorithm. The classification task i...
Loris Nanni, Alessandra Lumini
KDD
2004
ACM
196views Data Mining» more  KDD 2004»
14 years 11 months ago
Adversarial classification
Essentially all data mining algorithms assume that the datagenerating process is independent of the data miner's activities. However, in many domains, including spam detectio...
Nilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. ...