Sciweavers

861 search results - page 62 / 173
» Predicting Attack-prone Components
Sort
View
PAKDD
2004
ACM
127views Data Mining» more  PAKDD 2004»
14 years 4 months ago
Exploiting Recurring Usage Patterns to Enhance Filesystem and Memory Subsystem Performance
In many cases, normal uses of a system form patterns that will repeat. The most common patterns can be collected into a prediction model which will essentially predict that usage p...
Benjamin Rutt, Srinivasan Parthasarathy
JCB
2007
97views more  JCB 2007»
13 years 10 months ago
Parsing Nucleic Acid Pseudoknotted Secondary Structure: Algorithm and Applications
Accurate prediction of pseudoknotted nucleic acid secondary structure is an important computational challenge. Prediction algorithms based on dynamic programming aim to find a st...
Baharak Rastegari, Anne Condon
SECON
2010
IEEE
13 years 8 months ago
Cloudy Computing: Leveraging Weather Forecasts in Energy Harvesting Sensor Systems
To sustain perpetual operation, systems that harvest environmental energy must carefully regulate their usage to satisfy their demand. Regulating energy usage is challenging if a s...
Navin Sharma, Jeremy Gummeson, David Irwin, Prasha...
NIPS
2007
14 years 7 days ago
Congruence between model and human attention reveals unique signatures of critical visual events
Current computational models of bottom-up and top-down components of attention are predictive of eye movements across a range of stimuli and of simple, fixed visual tasks (such a...
Robert J. Peters, Laurent Itti
ICIP
2005
IEEE
15 years 14 days ago
An adaptive linear system framework for image distortion analysis
We describe a framework for decomposing the distortion between two images into a linear combination of components. Unlike conventional linear bases such as those in Fourier or wav...
Zhou Wang, Eero P. Simoncelli