Sciweavers

8655 search results - page 1292 / 1731
» Challenges for Trusted Computing
Sort
View
ICDM
2008
IEEE
102views Data Mining» more  ICDM 2008»
15 years 10 months ago
Mining Order-Preserving Submatrices from Data with Repeated Measurements
Order-preserving submatrices (OPSM’s) have been shown useful in capturing concurrent patterns in data when the relative magnitudes of data items are more important than their ab...
Chun Kit Chui, Ben Kao, Kevin Y. Yip, Sau Dan Lee
ICIP
2008
IEEE
15 years 10 months ago
Automatic lattice detection in near-regular histology array images
Near-regular texture (NRT), denoting deviations from otherwise symmetric wallpaper patterns, is commonly observable in the real world. Existing lattice detection algorithms captur...
Brian A. Canada, Georgia K. Thomas, Keith C. Cheng...
IISWC
2008
IEEE
15 years 10 months ago
Energy-aware application scheduling on a heterogeneous multi-core system
Heterogeneous multi-core processors are attractive for power efficient computing because of their ability to meet varied resource requirements of diverse applications in a workloa...
Jian Chen, Lizy Kurian John
IJCNN
2008
IEEE
15 years 10 months ago
Incremental Common Spatial Pattern algorithm for BCI
— A major challenge in applying machine learning methods to Brain-Computer Interfaces (BCIs) is to overcome the on-line non-stationarity of the data blocks. An effective BCI syst...
Qibin Zhao, Liqing Zhang, Andrzej Cichocki, Jie Li
INFOCOM
2008
IEEE
15 years 10 months ago
Attack-Tolerant Time-Synchronization in Wireless Sensor Networks
—Achieving secure time-synchronization in wireless sensor networks (WSNs) is a challenging, but very important problem that has not yet been addressed effectively. This paper pro...
Xin Hu, Taejoon Park, Kang G. Shin
« Prev « First page 1292 / 1731 Last » Next »