Sciweavers

1558 search results - page 241 / 312
» Scalable work stealing
Sort
View
CVPR
2012
IEEE
11 years 11 months ago
Tracking many vehicles in wide area aerial surveillance
Wide area aerial surveillance data has recently proliferated and increased the demand for multi-object tracking algorithms. However, the limited appearance information on every ta...
Jan Prokaj, Xuemei Zhao, Gérard G. Medioni
DAC
2012
ACM
11 years 11 months ago
Equivalence checking for behaviorally synthesized pipelines
Loop pipelining is a critical transformation in behavioral synthesis. It is crucial to producing hardware designs with acceptable latency and throughput. However, it is a complex ...
Kecheng Hao, Sandip Ray, Fei Xie
SDM
2012
SIAM
237views Data Mining» more  SDM 2012»
11 years 11 months ago
A Distributed Kernel Summation Framework for General-Dimension Machine Learning
Kernel summations are a ubiquitous key computational bottleneck in many data analysis methods. In this paper, we attempt to marry, for the first time, the best relevant technique...
Dongryeol Lee, Richard W. Vuduc, Alexander G. Gray
EUROSYS
2006
ACM
14 years 2 months ago
K42: building a complete operating system
K42 is one of the few recent research projects that is examining operating system design structure issues in the context of new whole-system design. K42 is open source and was des...
Orran Krieger, Marc A. Auslander, Bryan S. Rosenbu...
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
14 years 9 months ago
SNARE: a link analytic system for graph labeling and risk detection
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...