Sciweavers

2561 search results - page 198 / 513
» Enhanced Quicksort Algorithm
Sort
View
132
Voted
SIGCOMM
2012
ACM
13 years 5 months ago
Predicting location using mobile phone calls
Location prediction using mobile phone traces has attracted increasing attention. Owing to the irregular user mobility patterns, it still remains challenging to predict user locat...
Daqiang Zhang, Athanasios V. Vasilakos, Haoyi Xion...
120
Voted
TVCG
2012
196views Hardware» more  TVCG 2012»
13 years 5 months ago
Robust Morse Decompositions of Piecewise Constant Vector Fields
—In this paper, we introduce a new approach to computing a Morse decomposition of a vector field on a triangulated manifold surface. The basic idea is to convert the input vector...
Andrzej Szymczak, Eugene Zhang
355
Voted
DAC
2012
ACM
13 years 5 months ago
On software design for stochastic processors
Much recent research [8, 6, 7] suggests significant power and energy benefits of relaxing correctness constraints in future processors. Such processors with relaxed constraints ...
Joseph Sloan, John Sartori, Rakesh Kumar
130
Voted
ICPR
2008
IEEE
16 years 3 months ago
On using error bounds to optimize cost-sensitive multimodal biometric authentication
While using more biometric traits in multimodal biometric fusion can effectively increase the system robustness, often, the cost associated to adding additional systems is not con...
Norman Poh, Josef Kittler
113
Voted
ACSAC
2009
IEEE
15 years 6 months ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...