Sciweavers

1017 search results - page 175 / 204
» A fuzzy approach to automatic data locality optimization
Sort
View
66
Voted
DATE
2008
IEEE
134views Hardware» more  DATE 2008»
15 years 4 months ago
Adaptive Filesystem Compression for Embedded Systems
Abstract—Embedded system secondary storage size is often constrained, yet storage demands are growing as a result of increasing application complexity and storage of personal dat...
Lan S. Bai, Haris Lekatsas, Robert P. Dick
ICTAI
2007
IEEE
15 years 4 months ago
Prediction of Cerebral Aneurysm Rupture
Cerebral aneurysms are weak or thin spots on blood vessels in the brain that balloon out. While the majority of aneurysms do not burst, those that do would lead to serious complic...
Qiangfeng Peter Lau, Wynne Hsu, Mong-Li Lee, Ying ...
72
Voted
SPIEVIP
2008
15 years 3 days ago
Visual surveillance in maritime port facilities
In this work we propose a method for securing port facilities which uses a set of video cameras to automatically detect various vessel classes moving within buffer zones and off-l...
Mikel D. Rodriguez Sullivan, Mubarak Shah
69
Voted
BMCBI
2005
89views more  BMCBI 2005»
14 years 9 months ago
An empirical analysis of training protocols for probabilistic gene finders
Background: Generalized hidden Markov models (GHMMs) appear to be approaching acceptance as a de facto standard for state-of-the-art ab initio gene finding, as evidenced by the re...
William H. Majoros, Steven Salzberg
KDD
2004
ACM
196views Data Mining» more  KDD 2004»
15 years 10 months ago
Adversarial classification
Essentially all data mining algorithms assume that the datagenerating process is independent of the data miner's activities. However, in many domains, including spam detectio...
Nilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. ...