Sciweavers

520 search results - page 102 / 104
» Computing recombination networks from binary sequences
Sort
View
78
Voted
CVPR
2010
IEEE
15 years 6 months ago
Action Unit Detection with Segment-based SVMs
Automatic facial action unit (AU) detection from video is a long-standing problem in computer vision. Two main approaches have been pursued: (1) static modeling--typically posed a...
Tomas Simon, Nguyen Minh, Fernando De la Torre, Je...
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
15 years 4 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
SIGOPS
2011
210views Hardware» more  SIGOPS 2011»
14 years 4 months ago
Small trusted primitives for dependable systems
Secure, fault-tolerant distributed systems are difficult to build, to validate, and to operate. Conservative design for such systems dictates that their security and fault toleran...
Petros Maniatis, Byung-Gon Chun
KDD
2002
ACM
182views Data Mining» more  KDD 2002»
15 years 10 months ago
ANF: a fast and scalable tool for data mining in massive graphs
Graphs are an increasingly important data source, with such important graphs as the Internet and the Web. Other familiar graphs include CAD circuits, phone records, gene sequences...
Christopher R. Palmer, Phillip B. Gibbons, Christo...
89
Voted
ISLPED
2004
ACM
139views Hardware» more  ISLPED 2004»
15 years 3 months ago
Eliminating voltage emergencies via microarchitectural voltage control feedback and dynamic optimization
Microprocessor designers use techniques such as clock gating to reduce power dissipation. An unfortunate side-effect of these techniques is the processor current fluctuations th...
Kim M. Hazelwood, David Brooks