Sciweavers

1362 search results - page 161 / 273
» Feature Point Detection for Real Time Applications
Sort
View
ICDM
2008
IEEE
123views Data Mining» more  ICDM 2008»
15 years 4 months ago
Discovering Flow Anomalies: A SWEET Approach
Given a percentage-threshold and readings from a pair of consecutive upstream and downstream sensors, flow anomaly discovery identifies dominant time intervals where the fractio...
James M. Kang, Shashi Shekhar, Christine Wennen, P...
CCGRID
2009
IEEE
15 years 4 months ago
Performance under Failures of DAG-based Parallel Computing
— As the scale and complexity of parallel systems continue to grow, failures become more and more an inevitable fact for solving large-scale applications. In this research, we pr...
Hui Jin, Xian-He Sun, Ziming Zheng, Zhiling Lan, B...
SDM
2008
SIAM
97views Data Mining» more  SDM 2008»
14 years 11 months ago
Efficient Distribution Mining and Classification
We define and solve the problem of "distribution classification", and, in general, "distribution mining". Given n distributions (i.e., clouds) of multi-dimensi...
Yasushi Sakurai, Rosalynn Chong, Lei Li, Christos ...
DATE
2000
IEEE
103views Hardware» more  DATE 2000»
15 years 2 months ago
Protocol Stack-Based Telecom-Emulator
The paper describes the concept and implementation of a telecom emulator that features both recon gurability and high-speed processing. The emulator can be easily transmuted into ...
Takahiro Murooka, Toshiaki Miyazaki
ASPLOS
2006
ACM
15 years 4 months ago
AVIO: detecting atomicity violations via access interleaving invariants
Concurrency bugs are among the most difficult to test and diagnose of all software bugs. The multicore technology trend worsens this problem. Most previous concurrency bug detect...
Shan Lu, Joseph Tucek, Feng Qin, Yuanyuan Zhou