Sciweavers

5417 search results - page 1050 / 1084
» Simulation Optimization: Methods and Applications
Sort
View
SACMAT
2010
ACM
14 years 3 months ago
Mining roles with noisy data
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo...
CGO
2004
IEEE
14 years 2 months ago
Static Identification of Delinquent Loads
The effective use of processor caches is crucial to the performance of applications. It has been shown that cache misses are not evenly distributed throughout a program. In applic...
Vlad-Mihai Panait, Amit Sasturkar, Weng-Fai Wong
CIKM
2006
Springer
14 years 2 months ago
Mining compressed commodity workflows from massive RFID data sets
Radio Frequency Identification (RFID) technology is fast becoming a prevalent tool in tracking commodities in supply chain management applications. The movement of commodities thr...
Hector Gonzalez, Jiawei Han, Xiaolei Li
CVPR
2010
IEEE
14 years 2 months ago
Classification and Clustering via Dictionary Learning with Structured Incoherence
A clustering framework within the sparse modeling and dictionary learning setting is introduced in this work. Instead of searching for the set of centroid that best fit the data, ...
Pablo Sprechmann, Ignacio Ramirez, Guillermo Sapir...
CORR
2007
Springer
109views Education» more  CORR 2007»
13 years 11 months ago
Delayed Sequential Coding of Correlated Sources
— Motivated by video coding applications, we study the problem of sequential coding of correlated sources with (noncausal) encoding and/or decoding frame-delays. The fundamental ...
Nan Ma, Ye Wang, Prakash Ishwar
« Prev « First page 1050 / 1084 Last » Next »