Sciweavers

20197 search results - page 3819 / 4040
» Comparing Computational Power
Sort
View
106
Voted
CIVR
2008
Springer
138views Image Analysis» more  CIVR 2008»
15 years 2 months ago
MyPlaces: detecting important settings in a visual diary
We describe a novel approach to identifying specific settings in large collections of passively captured images corresponding to a visual diary. An algorithm developed for setting...
Michael Blighe, Noel E. O'Connor
CONCUR
2008
Springer
15 years 2 months ago
A Notion of Glue Expressiveness for Component-Based Systems
Abstract. Comparison between different formalisms and models is often by flattening structure and reducing them to behaviorally equivalent models e.g., automaton and Turing machine...
Simon Bliudze, Joseph Sifakis
RECOMB
2010
Springer
15 years 2 months ago
Leveraging Sequence Classification by Taxonomy-Based Multitask Learning
In this work we consider an inference task that biologists are very good at: deciphering biological processes by bringing together knowledge that has been obtained by experiments u...
Christian Widmer, Jose Leiva, Yasemin Altun, Gunna...
CP
2008
Springer
15 years 2 months ago
Elicitation Strategies for Fuzzy Constraint Problems with Missing Preferences: Algorithms and Experimental Studies
Fuzzy constraints are a popular approach to handle preferences and over-constrained problems in scenarios where one needs to be cautious, such as in medical or space applications. ...
Mirco Gelain, Maria Silvia Pini, Francesca Rossi, ...
DAC
2008
ACM
15 years 2 months ago
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
Krutartha Patel, Sri Parameswaran
« Prev « First page 3819 / 4040 Last » Next »