Sciweavers

5687 search results - page 1029 / 1138
» Visualizing Evaluation in Scheme
Sort
View
ISCA
1995
IEEE
120views Hardware» more  ISCA 1995»
14 years 23 days ago
Unconstrained Speculative Execution with Predicated State Buffering
Speculative execution is execution of instructions before it is known whether these instructions should be executed. Compiler-based speculative execution has the potential to achi...
Hideki Ando, Chikako Nakanishi, Tetsuya Hara, Masa...
CVPR
2010
IEEE
14 years 16 days ago
Discriminative K-SVD for Dictionary Learning in Face Recognition
In a sparse-representation-based face recognition scheme, the desired dictionary should have good representational power (i.e., being able to span the subspace of all faces) while...
Qiang Zhang, Baoxin Li
DIMVA
2008
13 years 10 months ago
Embedded Malware Detection Using Markov n-Grams
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commerci...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
IWEC
2008
13 years 10 months ago
Game Bot Detection Based on Avatar Trajectory
In recent years, online gaming has become one of the most popular Internet activities, but cheating activity, such as the use of game bots, has increased as a consequence. Generall...
Kuan-Ta Chen, Andrew Liao, Hsing-Kuo Kenneth Pao, ...
SIMUTOOLS
2008
13 years 10 months ago
A grid-enabled toolkit for in silico oncology simulations
In silico (on the computer) oncology is a multi-disciplinary field that focuses on the examination and modeling of biological mechanisms related to the phenomenon of cancer. In si...
Theodoros E. Athanaileas, Georgios S. Stamatakos, ...
« Prev « First page 1029 / 1138 Last » Next »