Sciweavers

278 search results - page 48 / 56
» Real time target evaluation search
Sort
View
ISCA
2007
IEEE
149views Hardware» more  ISCA 2007»
14 years 1 months ago
Virtual private caches
Virtual Private Machines (VPM) provide a framework for Quality of Service (QoS) in CMP-based computer systems. VPMs incorporate microarchitecture mechanisms that allow shares of h...
Kyle J. Nesbit, James Laudon, James E. Smith
SIGMOD
2005
ACM
212views Database» more  SIGMOD 2005»
14 years 7 months ago
A Cost-Based Model and Effective Heuristic for Repairing Constraints by Value Modification
Data integrated from multiple sources may contain inconsistencies that violate integrity constraints. The constraint repair problem attempts to find "low cost" changes t...
Philip Bohannon, Michael Flaster, Wenfei Fan, Raje...
CVPR
2010
IEEE
14 years 2 months ago
Scale-Hierarchical 3D Object Recognition in Cluttered Scenes
3D object recognition in scenes with occlusion and clutter is a difficult task. In this paper, we introduce a method that exploits the geometric scale-variability to aid in this ...
Prabin Bariya, Ko Nishino
RECSYS
2009
ACM
14 years 2 months ago
Context-based splitting of item ratings in collaborative filtering
Collaborative Filtering (CF) recommendations are computed by leveraging a historical data set of users’ ratings for items. It assumes that the users’ previously recorded ratin...
Linas Baltrunas, Francesco Ricci
IPPS
2008
IEEE
14 years 2 months ago
An effective pointer replication algorithm in P2P networks
Peer-to-Peer (P2P) networks have proven to be an efficient and successful mechanism for file sharing over the Internet. However, current P2P protocols have long worst case query...
Jian Zhou, Laxmi N. Bhuyan, Anirban Banerjee