Sciweavers

2719 search results - page 66 / 544
» Exposing Application Alternatives
Sort
View
CVPR
2011
IEEE
15 years 1 months ago
Sharing Features Between Objects and Their Attributes
Visual attributes expose human-defined semantics to object recognition models, but existing work largely restricts their influence to mid-level cues during classifier training....
Sung Ju Hwang, Fei Sha, Kristen Grauman
CSMR
2008
IEEE
15 years 12 months ago
Quantifying Maintainability in Feature Oriented Product Lines
Families of products are steadily emerging for distinct settings such as embedded systems, navigational systems, financial applications or even web applications. This shifts the a...
Gentzane Aldekoa, Salvador Trujillo, Goiuria Sagar...
PRDC
2008
IEEE
15 years 11 months ago
On the Complexity of a Self-Stabilizing Spanning Tree Algorithm for Large Scale Systems
Many large scale systems, like grids and structured peer to peer systems, operate on a constrained topology. Since underlying networks do not expose the real topology to the appli...
Julien Clement, Thomas Hérault, Stép...
SECURWARE
2008
IEEE
15 years 11 months ago
Analysis of Computer Infection Risk Factors Based on Customer Network Usage
— Epidemiology, the science that studies the cause and propagation of diseases, provides us with the concepts and methods to analyze the potential risk factors to which ADSL cust...
Yannick Carlinet, Ludovic Mé, Hervé ...
ASPLOS
2006
ACM
15 years 11 months ago
Exploiting coarse-grained task, data, and pipeline parallelism in stream programs
As multicore architectures enter the mainstream, there is a pressing demand for high-level programming models that can effectively map to them. Stream programming offers an attrac...
Michael I. Gordon, William Thies, Saman P. Amarasi...