Sciweavers

12943 search results - page 2522 / 2589
» Predicting When Not to Predict
Sort
View
JSA
2008
91views more  JSA 2008»
13 years 10 months ago
Using supplier locality in power-aware interconnects and caches in chip multiprocessors
Conventional snoopy-based chip multiprocessors take an aggressive approach broadcasting snoop requests to all nodes. In addition each node checks all received requests. This appro...
Ehsan Atoofian, Amirali Baniasadi
JFR
2006
140views more  JFR 2006»
13 years 10 months ago
Improving robot navigation through self-supervised online learning
In mobile robotics, there are often features that, while potentially powerful for improving navigation, prove difficult to profit from as they generalize poorly to novel situations...
Boris Sofman, Ellie Lin, J. Andrew Bagnell, John C...
ECOI
2007
80views more  ECOI 2007»
13 years 10 months ago
EcoLens: Integration and interactive visualization of ecological datasets
Complex multi-dimensional datasets are now pervasive in science and elsewhere in society. Better interactive tools are needed for visual data exploration so that patterns in such ...
Cynthia Sims Parr, Bongshin Lee, Benjamin B. Beder...
EJIS
2007
139views more  EJIS 2007»
13 years 10 months ago
Applying TAM across cultures: the need for caution
The technology acceptance model (TAM) is one of the most widely used behavioural models in the information systems (IS) field. Researchers have used the model to study many differ...
Scott McCoy, Dennis F. Galletta, William R. King
JMLR
2006
132views more  JMLR 2006»
13 years 10 months ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof
« Prev « First page 2522 / 2589 Last » Next »