Sciweavers

950 search results - page 187 / 190
» Continuous Queries over Data Streams - Semantics and Impleme...
Sort
View
ASPLOS
2010
ACM
15 years 4 months ago
Accelerating the local outlier factor algorithm on a GPU for intrusion detection systems
The Local Outlier Factor (LOF) is a very powerful anomaly detection method available in machine learning and classification. The algorithm defines the notion of local outlier in...
Malak Alshawabkeh, Byunghyun Jang, David R. Kaeli
PAMI
2012
12 years 12 months ago
Fast Joint Estimation of Silhouettes and Dense 3D Geometry from Multiple Images
—We propose a probabilistic formulation of joint silhouette extraction and 3D reconstruction given a series of calibrated 2D images. Instead of segmenting each image separately i...
Kalin Kolev, Thomas Brox, Daniel Cremers
RV
2010
Springer
177views Hardware» more  RV 2010»
14 years 7 months ago
Runtime Instrumentation for Precise Flow-Sensitive Type Analysis
We describe a combination of runtime information and static analysis for checking properties of complex and configurable systems. The basic idea of our approach is to 1) let the p...
Etienne Kneuss, Philippe Suter, Viktor Kuncak
BMCBI
2007
158views more  BMCBI 2007»
14 years 9 months ago
MetaLook: a 3D visualisation software for marine ecological genomics
Background: Marine ecological genomics can be defined as the application of genomic sciences to understand the structure and function of marine ecosystems. In this field of resear...
Thierry Lombardot, Renzo Kottmann, Gregory Giulian...
USS
2010
14 years 7 months ago
P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users
In this paper we introduce a framework for privacypreserving distributed computation that is practical for many real-world applications. The framework is called Peers for Privacy ...
Yitao Duan, NetEase Youdao, John Canny, Justin Z. ...