Sciweavers

870 search results - page 130 / 174
» The failure detector abstraction
Sort
View
ICDM
2009
IEEE
198views Data Mining» more  ICDM 2009»
14 years 3 months ago
Information Extraction for Clinical Data Mining: A Mammography Case Study
Abstract—Breast cancer is the leading cause of cancer mortality in women between the ages of 15 and 54. During mammography screening, radiologists use a strict lexicon (BI-RADS) ...
Houssam Nassif, Ryan Woods, Elizabeth S. Burnside,...
IEEEPACT
2009
IEEE
14 years 3 months ago
Quantifying the Potential of Program Analysis Peripherals
Abstract—As programmers are asked to manage more complicated parallel machines, it is likely that they will become increasingly dependent on tools such as multi-threaded data rac...
Mohit Tiwari, Shashidhar Mysore, Timothy Sherwood
SP
2010
IEEE
158views Security Privacy» more  SP 2010»
14 years 29 days ago
Tamper Evident Microprocessors
Abstract—Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors...
Adam Waksman, Simha Sethumadhavan
AINA
2004
IEEE
14 years 25 days ago
Online Training of SVMs for Real-time Intrusion Detection
Abstract-- As intrusion detection essentially can be formulated as a binary classification problem, it thus can be solved by an effective classification technique-Support Vector Ma...
Zonghua Zhang, Hong Shen
ECCV
2010
Springer
13 years 9 months ago
Efficient Computation of Scale-Space Features for Deformable Shape Correspondences
Abstract. With the rapid development of fast data acquisition techniques, 3D scans that record the geometric and photometric information of deformable objects are routinely acquire...
Tingbo Hou, Hong Qin