Sciweavers

1474 search results - page 128 / 295
» Exploiting Locality in a TMS
Sort
View
154
Voted
ICS
2000
Tsinghua U.
15 years 7 months ago
Hardware-only stream prefetching and dynamic access ordering
Memory system bottlenecks limit performance for many applications, and computations with strided access patterns are among the hardest hit. The streams used in such applications h...
Chengqiang Zhang, Sally A. McKee
PDCN
2004
15 years 5 months ago
Implementing a secure setuid program
Setuid programs are often exploited by malicious attackers to obtain unauthorized access to local systems. Setuid programs, especially owned by the root user, are granted root pri...
Takahiro Shinagawa, Kenji Kono
133
Voted
ICML
2010
IEEE
15 years 5 months ago
Active Learning for Networked Data
We introduce a novel active learning algorithm for classification of network data. In this setting, training instances are connected by a set of links to form a network, the label...
Mustafa Bilgic, Lilyana Mihalkova, Lise Getoor
CG
2010
Springer
15 years 4 months ago
Realistic cloth augmentation in single view video under occlusions
Augmenting cloth in real video is a challenging task because cloth performs complex motions and deformations and produces complex shading on the surface. Therefore, for a realisti...
Anna Hilsmann, David C. Schneider, Peter Eisert
IJON
2008
158views more  IJON 2008»
15 years 4 months ago
Blind separation of convolutive image mixtures
Convolutive mixtures of images are common in photography of semi-reflections. They also occur in microscopy and tomography. Their formation process involves focusing on an object ...
Sarit Shwartz, Yoav Y. Schechner, Michael Zibulevs...