Sciweavers

1017 search results - page 175 / 204
» A fuzzy approach to automatic data locality optimization
Sort
View
DATE
2008
IEEE
134views Hardware» more  DATE 2008»
15 years 6 months ago
Adaptive Filesystem Compression for Embedded Systems
Abstract—Embedded system secondary storage size is often constrained, yet storage demands are growing as a result of increasing application complexity and storage of personal dat...
Lan S. Bai, Haris Lekatsas, Robert P. Dick
ICTAI
2007
IEEE
15 years 6 months ago
Prediction of Cerebral Aneurysm Rupture
Cerebral aneurysms are weak or thin spots on blood vessels in the brain that balloon out. While the majority of aneurysms do not burst, those that do would lead to serious complic...
Qiangfeng Peter Lau, Wynne Hsu, Mong-Li Lee, Ying ...
SPIEVIP
2008
15 years 2 months ago
Visual surveillance in maritime port facilities
In this work we propose a method for securing port facilities which uses a set of video cameras to automatically detect various vessel classes moving within buffer zones and off-l...
Mikel D. Rodriguez Sullivan, Mubarak Shah
BMCBI
2005
89views more  BMCBI 2005»
14 years 11 months ago
An empirical analysis of training protocols for probabilistic gene finders
Background: Generalized hidden Markov models (GHMMs) appear to be approaching acceptance as a de facto standard for state-of-the-art ab initio gene finding, as evidenced by the re...
William H. Majoros, Steven Salzberg
KDD
2004
ACM
196views Data Mining» more  KDD 2004»
16 years 7 days ago
Adversarial classification
Essentially all data mining algorithms assume that the datagenerating process is independent of the data miner's activities. However, in many domains, including spam detectio...
Nilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. ...