Sciweavers

1176 search results - page 93 / 236
» Exploiting Online Games
Sort
View
JMLR
2010
198views more  JMLR 2010»
14 years 5 months ago
Online Anomaly Detection under Adversarial Impact
Security analysis of learning algorithms is gaining increasing importance, especially since they have become target of deliberate obstruction in certain applications. Some securit...
Marius Kloft, Pavel Laskov
CC
2012
Springer
243views System Software» more  CC 2012»
13 years 6 months ago
Sambamba: A Runtime System for Online Adaptive Parallelization
Abstract. How can we exploit a microprocessor as efficiently as possible? The “classic” approach is static optimization at compile-time, optimizing a program for all possible u...
Kevin Streit, Clemens Hammacher, Andreas Zeller, S...
BMCBI
2008
132views more  BMCBI 2008»
14 years 11 months ago
The SeqWord Genome Browser: an online tool for the identification and visualization of atypical regions of bacterial genomes thr
Background: Data mining in large DNA sequences is a major challenge in microbial genomics and bioinformatics. Oligonucleotide usage (OU) patterns provide a wealth of information f...
Hamilton Ganesan, Anna S. Rakitianskaia, Colin F. ...
IV
2000
IEEE
221views Visualization» more  IV 2000»
15 years 3 months ago
Animated Texture Alpha-Masks for Flow Visualization
A method of using a moving texture alpha-mask to represent scientific data is described, for the purpose of visualizing continuous fluid dynamics fields. The method combines strea...
Ian Curington
ISQED
2007
IEEE
165views Hardware» more  ISQED 2007»
15 years 5 months ago
On-Line Adjustable Buffering for Runtime Power Reduction
We present a novel technique to exploit the power-performance tradeoff. The technique can be used stand-alone or in conjunction with dynamic voltage scaling, the mainstream techn...
Andrew B. Kahng, Sherief Reda, Puneet Sharma