Sciweavers

1816 search results - page 232 / 364
» Trace oblivious computation
Sort
View
CGF
2008
131views more  CGF 2008»
13 years 9 months ago
Peek-in-the-Pic: Flying Through Architectural Scenes From a Single Image
Many casually taken "tourist" photographs comprise of architectural objects like houses, buildings, etc. Reconstructing such 3D scenes captured in a single photograph is...
Amit Shesh, Baoquan Chen
CN
2004
103views more  CN 2004»
13 years 8 months ago
Modeling IP traffic: joint characterization of packet arrivals and packet sizes using BMAPs
This paper proposes a traffic model and a parameter fitting procedure that are capable of achieving accurate prediction of the queuing behavior for IP traffic exhibiting long-rang...
Paulo Salvador, António Pacheco, Rui Valada...
NECO
2007
258views more  NECO 2007»
13 years 8 months ago
Reinforcement Learning Through Modulation of Spike-Timing-Dependent Synaptic Plasticity
The persistent modification of synaptic efficacy as a function of the relative timing of pre- and postsynaptic spikes is a phenomenon known as spiketiming-dependent plasticity (...
Razvan V. Florian
SADFE
2010
IEEE
13 years 6 months ago
Fonts for Forensics
: Like other latent evidence that cannot be directly perceived by people, bit sequences have to be presented through tools. Presentations of digital forensic evidence often involve...
Fred Cohen
INFOCOM
2012
IEEE
11 years 11 months ago
CARPO: Correlation-aware power optimization in data center networks
—Power optimization has become a key challenge in the design of large-scale enterprise data centers. Existing research efforts focus mainly on computer servers to lower their ene...
Xiaodong Wang, Yanjun Yao, Xiaorui Wang, Kefa Lu, ...