Sciweavers

570 search results - page 113 / 114
» Efficient retrieval of similar shapes
Sort
View
EUROSYS
2010
ACM
13 years 9 months ago
Fingerprinting the Datacenter: Automated Classification of Performance Crises
When a performance crisis occurs in a datacenter, rapid recovery requires quickly recognizing whether a similar incident occurred before, in which case a known remedy may apply, o...
Peter Bodik, Moises Goldszmidt, Armando Fox, Dawn ...
CHES
2006
Springer
131views Cryptology» more  CHES 2006»
13 years 9 months ago
Why One Should Also Secure RSA Public Key Elements
It is well known that a malicious adversary can try to retrieve secret information by inducing a fault during cryptographic operations. Following the work of Seifert on fault induc...
Eric Brier, Benoît Chevallier-Mames, Mathieu...
APGV
2010
ACM
236views Visualization» more  APGV 2010»
13 years 9 months ago
The effect of stereo and context on memory and awareness states in immersive virtual environments
Spatial awareness is crucial for human performance efficiency of any task that entails perception of space. Memory of spaces is an imperfect reflection of the cognitive activity (...
Adam Bennett, Matthew Coxon, Katerina Mania
BMCBI
2010
160views more  BMCBI 2010»
13 years 5 months ago
Identification of functional hubs and modules by converting interactome networks into hierarchical ordering of proteins
Background: Protein-protein interactions play a key role in biological processes of proteins within a cell. Recent high-throughput techniques have generated protein-protein intera...
Young-Rae Cho, Aidong Zhang
ISI
2006
Springer
13 years 5 months ago
Tracing the Event Evolution of Terror Attacks from On-Line News
Since the September 11th terror attack at New York in 2001, the frequency of terror attacks around the world has been increasing and it draws more attention of the public. On Janua...
Christopher C. Yang, Xiaodong Shi, Chih-Ping Wei