Sciweavers

7681 search results - page 1448 / 1537
» Typed Membrane Systems
Sort
View
128
Voted
EUROSYS
2007
ACM
16 years 25 days ago
Exploiting nonstationarity for performance prediction
Real production applications ranging from enterprise applications to large e-commerce sites share a crucial but seldom-noted characteristic: The relative frequencies of transactio...
Christopher Stewart, Terence Kelly, Alex Zhang
122
Voted
EUROGRAPHICS
2010
Eurographics
16 years 24 days ago
Mesh Decomposition with Cross-Boundary Brushes
We present a new intuitive UI, which we call cross-boundary brushes, for interactive mesh decomposition. The user roughly draws one or more strokes across a desired cut and our sy...
Youyi Zheng and Chiew-Lan Tai
122
Voted
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
16 years 21 days ago
Making register file resistant to power analysis attacks
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...
WWW
2010
ACM
15 years 10 months ago
The paths more taken: matching DOM trees to search logs for accurate webpage clustering
An unsupervised clustering of the webpages on a website is a primary requirement for most wrapper induction and automated data extraction methods. Since page content can vary dras...
Deepayan Chakrabarti, Rupesh R. Mehta
156
Voted
WWW
2010
ACM
15 years 10 months ago
Entity relation discovery from web tables and links
The World-Wide Web consists not only of a huge number of unstructured texts, but also a vast amount of valuable structured data. Web tables [2] are a typical type of structured in...
Cindy Xide Lin, Bo Zhao, Tim Weninger, Jiawei Han,...
« Prev « First page 1448 / 1537 Last » Next »