Sciweavers

4903 search results - page 812 / 981
» The Set Covering Machine
Sort
View
HASE
2007
IEEE
14 years 4 months ago
On the Verifiability of Programs Written in the Feature Language Extensions
High assurance in embedded system software is difficult to attain. Verification relies on testing. The unreliable and costly testing process is made much worse because the softwar...
Wu-Hon F. Leung
ICAC
2007
IEEE
14 years 4 months ago
Energy-Aware Mobile Service Overlays: Cooperative Dynamic Power Management in Distributed Mobile Systems
With their increasingly powerful computational resources and high-speed wireless communications, future mobile systems will have the ability to run sophisticated applications on c...
Balasubramanian Seshasayee, Ripal Nathuji, Karsten...
ICDM
2007
IEEE
157views Data Mining» more  ICDM 2007»
14 years 3 months ago
Failure Prediction in IBM BlueGene/L Event Logs
Frequent failures are becoming a serious concern to the community of high-end computing, especially when the applications and the underlying systems rapidly grow in size and compl...
Yinglung Liang, Yanyong Zhang, Hui Xiong, Ramendra...
ICEBE
2007
IEEE
115views Business» more  ICEBE 2007»
14 years 3 months ago
A Concurrent G-Negotiation Mechanism for Grid Resource Co-allocation
Since computationally intensive applications may often require more resources than a single computing machine can provide in one administrative domain, bolstering resource co-allo...
Benyun Shi, Kwang Mong Sim
ICMCS
2007
IEEE
133views Multimedia» more  ICMCS 2007»
14 years 3 months ago
Data Modeling Strategies for Imbalanced Learning in Visual Search
In this paper we examine a novel approach to the difficult problem of querying video databases using visual topics with few examples. Typically with visual topics, the examples a...
Jelena Tesic, Apostol Natsev, Lexing Xie, John R. ...