Sciweavers

861 search results - page 125 / 173
» Predicting Attack-prone Components
Sort
View
IPPS
2005
IEEE
14 years 1 months ago
Technology-based Architectural Analysis of Operand Bypass Networks for Efficient Operand Transport
As semiconductor feature sizes decrease, interconnect delay is becoming a dominant component of processor cycle times. This creates a critical need to shift microarchitectural des...
Hongkyu Kim, D. Scott Wills, Linda M. Wills
MM
2005
ACM
175views Multimedia» more  MM 2005»
14 years 1 months ago
Towards context-aware face recognition
In this paper, we focus on the use of context-aware, collaborative filtering, machine-learning techniques that leverage automatically sensed and inferred contextual metadata toget...
Marc Davis, Michael Smith, John F. Canny, Nathan G...
SIGIR
2005
ACM
14 years 1 months ago
An exploration of axiomatic approaches to information retrieval
Existing retrieval models generally do not offer any guarantee for optimal retrieval performance. Indeed, it is even difficult, if not impossible, to predict a model’s empirica...
Hui Fang, ChengXiang Zhai
GRID
2005
Springer
14 years 1 months ago
ASKALON: a Grid application development and computing environment
— We present the ASKALON environment whose goal is to simplify the development and execution of workflow applications on the Grid. ASKALON is centered around a set of high-level...
Thomas Fahringer, Radu Prodan, Rubing Duan, France...
IPSN
2005
Springer
14 years 1 months ago
Perpetual environmentally powered sensor networks
— Environmental energy is an attractive power source for low power wireless sensor networks. We present Prometheus, a system that intelligently manages energy transfer for perpet...
Xiaofan Jiang, Joseph Polastre, David E. Culler