Sciweavers

861 search results - page 118 / 173
» Predicting Attack-prone Components
Sort
View
ICCV
2003
IEEE
15 years 8 days ago
A Novel Approach For Texture Shape Recovery
In vision and graphics, there is a sustained interest in capturing accurate 3D shape with various scanning devices. However, the resulting geometric representation is only part of...
Jing Wang 0008, Kristin J. Dana
DAC
2004
ACM
14 years 11 months ago
STAC: statistical timing analysis with correlation
Current technology trends have led to the growing impact of both inter-die and intra-die process variations on circuit performance. While it is imperative to model parameter varia...
Jiayong Le, Xin Li, Lawrence T. Pileggi
WWW
2008
ACM
14 years 11 months ago
Understanding internet video sharing site workload: a view from data center design
In this paper we measured and analyzed the workload on Yahoo! Video, the 2nd largest U.S. video sharing site, to understand its nature and the impact on online video data center d...
Xiaozhu Kang, Hui Zhang 0002, Guofei Jiang, Haifen...
KDD
2008
ACM
192views Data Mining» more  KDD 2008»
14 years 10 months ago
Partial least squares regression for graph mining
Attributed graphs are increasingly more common in many application domains such as chemistry, biology and text processing. A central issue in graph mining is how to collect inform...
Hiroto Saigo, Koji Tsuda, Nicole Krämer
HPCA
2003
IEEE
14 years 10 months ago
Deterministic Clock Gating for Microprocessor Power Reduction
With the scaling of technology and the need for higher performance and more functionality, power dissipation is becoming a major bottleneck for microprocessor designs. Pipeline ba...
Hai Li, Swarup Bhunia, Yiran Chen, T. N. Vijaykuma...