Sciweavers

322 search results - page 30 / 65
» Recovering execution data from incomplete observations
Sort
View
JMS
2010
65views more  JMS 2010»
13 years 8 months ago
A Tree-Based Decision Model to Support Prediction of the Severity of Asthma Exacerbations in Children
This paper describes the development of a tree-based decision model to predict the severity of pediatric asthma exacerbations in the emergency department (ED) at two hours followi...
Ken Farion, Wojtek Michalowski, Szymon Wilk, Dympn...
CVPR
2010
IEEE
14 years 6 months ago
Monocular 3D Pose Estimation and Tracking by Detection
Automatic recovery of 3D human pose from monocular image sequences is a challenging and important research topic with numerous applications. Although current methods are able to r...
Mykhaylo Andriluka, Stefan Roth, Bernt Schiele
CCS
2005
ACM
14 years 3 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
DCOSS
2005
Springer
13 years 11 months ago
An Adaptive Blind Algorithm for Energy Balanced Data Propagation in Wireless Sensors Networks
In this paper, we consider the problem of energy balanced data propagation in wireless sensor networks and we generalise previous works by allowing realistic energy assignment. A n...
Pierre Leone, Sotiris E. Nikoletseas, José ...
ASPLOS
2000
ACM
14 years 2 months ago
Frequent Value Locality and Value-Centric Data Cache Design
By studying the behavior of programs in the SPECint95 suite we observed that six out of eight programs exhibit a new kind of value locality, the frequent value locality, according...
Youtao Zhang, Jun Yang 0002, Rajiv Gupta