Sciweavers

4979 search results - page 89 / 996
» Batch codes and their applications
Sort
View
ICARCV
2008
IEEE
154views Robotics» more  ICARCV 2008»
15 years 4 months ago
Detecting spurious features using parity space
—Detection of spurious features is instrumental in many computer vision applications. The standard approach is feature based, where extracted features are matched between the ima...
David Törnqvist, Thomas B. Schön, Fredri...
IPPS
2007
IEEE
15 years 4 months ago
Prediction Services for Distributed Computing
Users of distributed systems such as the TeraGrid and Open Science Grid can execute their applications on many different systems. We wish to help such users, or the grid scheduler...
Warren Smith
VLDB
1999
ACM
133views Database» more  VLDB 1999»
15 years 2 months ago
Online Dynamic Reordering for Interactive Data Processing
We present a pipelining, dynamically usercontrollable reorder operator, for use in dataintensive applications. Allowing the user to reorder the data delivery on the fly increases...
Vijayshankar Raman, Bhaskaran Raman, Joseph M. Hel...
HICSS
1996
IEEE
123views Biometrics» more  HICSS 1996»
15 years 2 months ago
Concurrency: A Case Study in Remote Tasking and Distributed IPC
Remote tasking encompasses different functionality, such as remote forking, multiple remote spawning, and task migration. In order to overcome the relatively high costs of these m...
Dejan S. Milojicic, Alan Langerman, David L. Black...
88
Voted
ICAI
2008
14 years 11 months ago
Online Boosting Based Intrusion Detection in Changing Environments
Intrusion detection is an active research field in the development of reliable web-based information systems, where many artificial intelligence techniques are exploited to fit th...
Yanguo Wang, Weiming Hu, Xiaoqin Zhang