Sciweavers

3689 search results - page 580 / 738
» The Branding Analysis Pattern
Sort
View
ICDCS
2009
IEEE
16 years 1 months ago
FlashLite: A User-Level Library to Enhance Durability of SSD for P2P File Sharing
Peer-to-peer file sharing is popular, but it generates random write traffic to storage due to the nature of swarming. NAND flash memory based Solid-State Drive (SSD) technology...
Hyojun Kim, Umakishore Ramachandran
133
Voted
ICCAD
2006
IEEE
180views Hardware» more  ICCAD 2006»
16 years 1 months ago
A bitmask-based code compression technique for embedded systems
Embedded systems are constrained by the available memory. Code compression techniques address this issue by reducing the code size of application programs. Dictionary-based code c...
Seok-Won Seong, Prabhat Mishra
CSCW
2010
ACM
16 years 1 months ago
Reading between the lines: linguistic cues to deception in online dating profiles
This study investigates whether deception in online dating profiles is detectable through a linguistic approach, which assumes that liars nonconsciously produce different word pat...
Catalina L. Toma, Jeffrey T. Hancock
CVPR
2010
IEEE
16 years 29 days ago
The Role of Features, Algorithms and Data in Visual Recognition
There are many computer vision algorithms developed for visual (scene and object) recognition. Some systems focus on involved learning algorithms, some leverage millions of trainin...
Devi Parikh and C. Lawrence Zitnick
123
Voted
WWW
2010
ACM
15 years 11 months ago
Scalable discovery of contradictions on the web
Our study addresses the problem of large-scale contradiction detection and management, from data extracted from the Web. We describe the first systematic solution to the problem,...
Mikalai Tsytsarau, Themis Palpanas, Kerstin Deneck...