Sciweavers

419 search results - page 69 / 84
» Three Case Studies of Large-Scale Data Flows
Sort
View
22
Voted
IPCCC
1999
IEEE
14 years 16 hour ago
Management policies for non-volatile write caches
Many computer hardware and software architectures buffer data in memory to improve system performance. Volatile disk or file caches are sometimes used to delay the propagation of ...
Theodore R. Haining, Darrell D. E. Long
AAAI
2007
13 years 10 months ago
A Robot That Uses Existing Vocabulary to Infer Non-Visual Word Meanings from Observation
The authors present TWIG, a visually grounded wordlearning system that uses its existing knowledge of vocabulary, grammar, and action schemas to help it learn the meanings of new ...
Kevin Gold, Brian Scassellati
TMI
2010
318views more  TMI 2010»
13 years 6 months ago
elastix: A Toolbox for Intensity-Based Medical Image Registration
—Medical image registration is an important task in medical image processing. It refers to the process of aligning data sets, possibly from different modalities (e.g., magnetic r...
Stefan Klein, Marius Staring, Keelin Murphy, Max A...
ICDAR
2009
IEEE
13 years 5 months ago
Learning Bayesian Networks by Evolution for Classifier Combination
Combining classifier methods have shown their effectiveness in a number of applications. Nonetheless, using simultaneously multiple classifiers may result in some cases in a reduc...
Claudio De Stefano, Francesco Fontanella, Alessand...
ESEM
2010
ACM
13 years 6 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams