Sciweavers

12257 search results - page 408 / 2452
» Analysis of Algorithms
Sort
View
119
Voted
CORR
2010
Springer
124views Education» more  CORR 2010»
15 years 4 months ago
Link Graph Analysis for Adult Images Classification
In order to protect an image search engine's users from undesirable results adult images' classifier should be built. The information about links from websites to images...
Evgeny Kharitonov, Anton Slesarev, Ilya Muchnik, F...
ECR
2006
107views more  ECR 2006»
15 years 4 months ago
Software watermarking via opaque predicates: Implementation, analysis, and attacks
Within the software industry software piracy is a great concern. In this article we address this issue through a prevention technique called software watermarking. Depending on ho...
Ginger Myles, Christian S. Collberg
IJHPCA
2006
99views more  IJHPCA 2006»
15 years 4 months ago
A Pragmatic Analysis Of Scheduling Environments On New Computing Platforms
Today, large scale parallel systems are available at relatively low cost. Many powerful such systems have been installed all over the world and the number of users is always incre...
Lionel Eyraud
IJAR
2007
55views more  IJAR 2007»
15 years 4 months ago
Theoretical analysis and practical insights on importance sampling in Bayesian networks
The AIS-BN algorithm [2] is a successful importance sampling-based algorithm for Bayesian networks that relies on two heuristic methods to obtain an initial importance function: -...
Changhe Yuan, Marek J. Druzdzel
151
Voted
TCAD
2008
103views more  TCAD 2008»
15 years 4 months ago
Topology-Based Performance Analysis and Optimization of Latency-Insensitive Systems
Latency-insensitive protocols allow system-on-chip (SoC) engineers to decouple the design of the computing cores from the design of the intercore communication channels while follo...
Rebecca L. Collins, Luca P. Carloni