Sciweavers

511 search results - page 86 / 103
» Building a High-performance Computing Cluster Using FreeBSD
Sort
View
74
Voted
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
15 years 6 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
VC
2008
138views more  VC 2008»
14 years 9 months ago
A GPU-based light hierarchy for real-time approximate illumination
Illumination rendering including environment lighting, indirect illumination, and subsurface scattering plays for many graphics applications such as games and VR systems. However, ...
Hyunwoo Ki, Kyoungsu Oh
96
Voted
JMLR
2010
169views more  JMLR 2010»
14 years 4 months ago
Matrix-Variate Dirichlet Process Mixture Models
We are concerned with a multivariate response regression problem where the interest is in considering correlations both across response variates and across response samples. In th...
Zhihua Zhang, Guang Dai, Michael I. Jordan
ICAC
2006
IEEE
15 years 3 months ago
Learning Application Models for Utility Resource Planning
Abstract— Shared computing utilities allocate compute, network, and storage resources to competing applications on demand. An awareness of the demands and behaviors of the hosted...
Piyush Shivam, Shivnath Babu, Jeffrey S. Chase
ICSM
2007
IEEE
15 years 4 months ago
A Maintainable Software Architecture for Fast and Modular Bioinformatics Sequence Search
Bioinformaticists use the Basic Local Alignment Search Tool (BLAST) to characterize an unknown sequence by comparing it against a database of known sequences, thus detecting evolu...
Jeremy S. Archuleta, Eli Tilevich, Wu-chun Feng