Sciweavers

13436 search results - page 2644 / 2688
» e
Sort
View
EGH
2010
Springer
13 years 8 months ago
GPU random numbers via the tiny encryption algorithm
Random numbers are extensively used on the GPU. As more computation is ported to the GPU, it can no longer be treated as rendering hardware alone. Random number generators (RNG) a...
Fahad Zafar, Marc Olano, Aaron Curtis
GLOBECOM
2010
IEEE
13 years 8 months ago
An Experimental Comparison of Burst Packet Transmission Schemes in IEEE 802.11-Based Wireless Mesh Networks
Abstract--Wireless mesh networks (WMNs) are wireless multihop networks comprised of mesh routers, which relay traffic on behalf of clients and other nodes. Using the standard IEEE ...
Peter Dely, Andreas Kassler, Nico Bayer, Dmitry Si...
GROUP
2010
ACM
13 years 8 months ago
Design, implementation, and evaluation of an approach for determining when programmers are having difficulty
Previous research has motivated the idea of automatically determining when programmers are having difficulty, provided an initial algorithm (unimplemented in an actual system), an...
Jason Carter, Prasun Dewan
ICDM
2010
IEEE
168views Data Mining» more  ICDM 2010»
13 years 8 months ago
Anomaly Detection Using an Ensemble of Feature Models
We present a new approach to semi-supervised anomaly detection. Given a set of training examples believed to come from the same distribution or class, the task is to learn a model ...
Keith Noto, Carla E. Brodley, Donna K. Slonim
ICDM
2010
IEEE
152views Data Mining» more  ICDM 2010»
13 years 8 months ago
Reviewer Profiling Using Sparse Matrix Regression
Thousands of scientific conferences happen every year, and each involves a laborious scientific peer review process conducted by one or more busy scientists serving as Technical/Sc...
Evangelos E. Papalexakis, Nicholas D. Sidiropoulos...
« Prev « First page 2644 / 2688 Last » Next »