Sciweavers

126 search results - page 20 / 26
» A Framework for Evaluating Stereo-Based Pedestrian Detection...
Sort
View
SIGMETRICS
2011
ACM
178views Hardware» more  SIGMETRICS 2011»
14 years 8 days ago
Soft error benchmarking of L2 caches with PARMA
The amount of charge stored in an SRAM cell shrinks rapidly with each technology generation thus increasingly exposing caches to soft errors. Benchmarking the FIT rate of caches d...
Jinho Suh, Mehrtash Manoochehri, Murali Annavaram,...
99
Voted
ESORICS
2009
Springer
15 years 1 months ago
An Effective Method for Combating Malicious Scripts Clickbots
Abstract. Online advertising has been suffering serious click fraud problem. Fraudulent publishers can generate false clicks using malicious scripts embedded in their web pages. Ev...
Yanlin Peng, Linfeng Zhang, J. Morris Chang, Yong ...
IJNSEC
2008
131views more  IJNSEC 2008»
14 years 9 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
ICDE
2003
IEEE
180views Database» more  ICDE 2003»
15 years 10 months ago
Medical Video Mining for Efficient Database Indexing, Management and Access
1 To achieve more efficient video indexing and access, we introduce a video database management framework and strategies for video content structure and events mining. The video sh...
Xingquan Zhu, Walid G. Aref, Jianping Fan, Ann Chr...
SIGMOD
2005
ACM
212views Database» more  SIGMOD 2005»
15 years 9 months ago
A Cost-Based Model and Effective Heuristic for Repairing Constraints by Value Modification
Data integrated from multiple sources may contain inconsistencies that violate integrity constraints. The constraint repair problem attempts to find "low cost" changes t...
Philip Bohannon, Michael Flaster, Wenfei Fan, Raje...