Sciweavers

2414 search results - page 376 / 483
» Computing Normal Subgroups
Sort
View
ISPASS
2006
IEEE
15 years 4 months ago
Workload sanitation for performance evaluation
The performance of computer systems depends, among other things, on the workload. Performance evaluations are therefore often done using logs of workloads on current productions s...
Dror G. Feitelson, Dan Tsafrir
IWIA
2006
IEEE
15 years 4 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
SMI
2006
IEEE
131views Image Analysis» more  SMI 2006»
15 years 4 months ago
Robust 3D Shape Correspondence in the Spectral Domain
We present an algorithm for finding a meaningful vertexto-vertex correspondence between two 3D shapes given as triangle meshes. Our algorithm operates on embeddings of the two sh...
Varun Jain, Hao Zhang 0002
VTC
2006
IEEE
15 years 4 months ago
Reduced-Complexity Maximum-Likelihood Detection in Downlink SDMA Systems
— The literature of up-link SDMA systems is rich, but at the time of writing there is a paucity of information on the employment of SDMA techniques in the down-link. Hence, in th...
Jos Akhtman, Chun-Yi Wei, Lajos Hanzo
APGV
2006
ACM
15 years 4 months ago
Updating orientation in large virtual environments using scaled translational gain
Navigating through large virtual environments using a headmounted display (HMD) is difficult due to the spatial limitations of the tracking system. We conducted two experiments t...
Betsy Williams, Gayathri Narasimham, Timothy P. Mc...