Sciweavers

8080 search results - page 1503 / 1616
» From Computer Networks to Agent Networks
Sort
View
ICIAP
2003
ACM
15 years 9 months ago
PCA vs low resolution images in face verification
Principal Components Analysis (PCA) has been one of the most applied methods for face verification using only 2D information, in fact, PCA is practically the method of choice for ...
Cristina Conde, Antonio Ruiz, Enrique Cabello
ICTCS
2003
Springer
15 years 9 months ago
Cost Constrained Fixed Job Scheduling
In this paper, we study the problem of cost constrained fixed job scheduling (CCFJS). In this problem, there are a number of processors, each of which belongs to one of several cla...
Qiwei Huang, Errol L. Lloyd
HT
2010
ACM
15 years 8 months ago
Discovery of information disseminators and receptors on online social media
Today, there is significant sharing of information artifacts among users on various social media sites, including Digg, Twitter and Flickr. An interesting consequence of such ric...
Munmun De Choudhury
134
Voted
ICDM
2002
IEEE
156views Data Mining» more  ICDM 2002»
15 years 8 months ago
Predicting Rare Events In Temporal Domains
Temporal data mining aims at finding patterns in historical data. Our work proposes an approach to extract temporal patterns from data to predict the occurrence of target events,...
Ricardo Vilalta, Sheng Ma
ICPP
2002
IEEE
15 years 8 months ago
Linux/SimOS - A Simulation Environment for Evaluating High-Speed Communication Systems
This paper presents Linux/SimOS, a Linux operating system port to SimOS, which is a complete machine simulator from Stanford. The motivation for Linux/SimOS is to alleviate the li...
Chulho Won, Ben Lee, Chansu Yu, Sangman Moh, Yong-...
« Prev « First page 1503 / 1616 Last » Next »