Sciweavers

1964 search results - page 372 / 393
» An analysis of extensible modelling for functional genomics ...
Sort
View
CIVR
2007
Springer
189views Image Analysis» more  CIVR 2007»
15 years 3 months ago
Online video recommendation based on multimodal fusion and relevance feedback
With Internet delivery of video content surging to an unprecedented level, video recommendation has become a very popular online service. The capability of recommending relevant v...
Bo Yang, Tao Mei, Xian-Sheng Hua, Linjun Yang, Shi...
MICRO
2005
IEEE
130views Hardware» more  MICRO 2005»
15 years 3 months ago
Exploiting Vector Parallelism in Software Pipelined Loops
An emerging trend in processor design is the addition of short vector instructions to general-purpose and embedded ISAs. Frequently, these extensions are employed using traditiona...
Samuel Larsen, Rodric M. Rabbah, Saman P. Amarasin...
TWC
2008
154views more  TWC 2008»
14 years 9 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
ICDE
2008
IEEE
124views Database» more  ICDE 2008»
15 years 11 months ago
Mining Approximate Order Preserving Clusters in the Presence of Noise
Subspace clustering has attracted great attention due to its capability of finding salient patterns in high dimensional data. Order preserving subspace clusters have been proven to...
Mengsheng Zhang, Wei Wang 0010, Jinze Liu
GAMESEC
2011
287views Game Theory» more  GAMESEC 2011»
13 years 9 months ago
Collaborative Location Privacy with Rational Users
Recent smartphones incorporate embedded GPS devices that enable users to obtain geographic information about their surroundings by providing a location-based service (LBS) with the...
Francisco Santos, Mathias Humbert, Reza Shokri, Je...