Sciweavers

1221 search results - page 15 / 245
» A Comparison of Two Programming Models for Pervasive Computi...
Sort
View
SIGMOD
2009
ACM
136views Database» more  SIGMOD 2009»
15 years 9 months ago
A comparison of approaches to large-scale data analysis
There is currently considerable enthusiasm around the MapReduce (MR) paradigm for large-scale data analysis [17]. Although the basic control flow of this framework has existed in ...
Andrew Pavlo, Erik Paulson, Alexander Rasin, Danie...
CVPR
2000
IEEE
15 years 11 months ago
Codimension - Two Geodesic Active Contours for the Segmentation of Tubular Structures
Curve evolution schemes for segmentation, implemented with level set methods, have become an important approach in computer vision. Previous work has modeled evolving contours whi...
Liana M. Lorigo, W. Eric L. Grimson, Olivier D. Fa...
COLING
2010
14 years 4 months ago
Word-based and Character-based Word Segmentation Models: Comparison and Combination
We present a theoretical and empirical comparative analysis of the two dominant categories of approaches in Chinese word segmentation: word-based models and character-based models...
Weiwei Sun
ASPDAC
2011
ACM
217views Hardware» more  ASPDAC 2011»
14 years 1 months ago
Realization and performance comparison of sequential and weak memory consistency models in network-on-chip based multi-core syst
This paper studies realization and performance comparison of the sequential and weak consistency models in the network-on-chip (NoC) based distributed shared memory (DSM) multi-cor...
Abdul Naeem, Xiaowen Chen, Zhonghai Lu, Axel Jants...
68
Voted
CSREASAM
2008
14 years 11 months ago
An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing
Pervasive computing allows data to be collected using sensors and mobile devices. Recent studies, however, show that in emergency and crisis situations conventional access control ...
Danfeng Yao