Sciweavers

12257 search results - page 2401 / 2452
» Analysis of Algorithms
Sort
View
KDD
2010
ACM
270views Data Mining» more  KDD 2010»
15 years 3 months ago
An energy-efficient mobile recommender system
The increasing availability of large-scale location traces creates unprecedent opportunities to change the paradigm for knowledge discovery in transportation systems. A particular...
Yong Ge, Hui Xiong, Alexander Tuzhilin, Keli Xiao,...
COLT
2008
Springer
15 years 3 months ago
An Information Theoretic Framework for Multi-view Learning
In the multi-view learning paradigm, the input variable is partitioned into two different views X1 and X2 and there is a target variable Y of interest. The underlying assumption i...
Karthik Sridharan, Sham M. Kakade
EXPCS
2007
15 years 3 months ago
Pipeline spectroscopy
Pipeline Spectroscopy is a new technique that allows us to measure the cost of each cache miss. The cost of a miss is displayed (graphed) as a histogram, which represents a precis...
Thomas R. Puzak, Allan Hartstein, Philip G. Emma, ...
DAC
2008
ACM
15 years 3 months ago
Application mapping for chip multiprocessors
The problem attacked in this paper is one of automatically mapping an application onto a Network-on-Chip (NoC) based chip multiprocessor (CMP) architecture in a locality-aware fas...
Guangyu Chen, Feihui Li, Seung Woo Son, Mahmut T. ...
DFT
2008
IEEE
149views VLSI» more  DFT 2008»
15 years 3 months ago
Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices?
Side-channel attacks are nowadays a serious concern when implementing cryptographic algorithms. Powerful ways for gaining information about the secret key as well as various count...
Francesco Regazzoni, Thomas Eisenbarth, Luca Breve...
« Prev « First page 2401 / 2452 Last » Next »