Sciweavers

718 search results - page 131 / 144
» From decision theory to decision aiding methodology
Sort
View
PAMI
2007
107views more  PAMI 2007»
14 years 9 months ago
Recognition of Pornographic Web Pages by Classifying Texts and Images
—With the rapid development of the World Wide Web, people benefit more and more from the sharing of information. However, Web pages with obscene, harmful, or illegal content can ...
Weiming Hu, Ou Wu, Zhouyao Chen, Zhouyu Fu, Stephe...
95
Voted
DAC
2007
ACM
15 years 10 months ago
Shared Resource Access Attributes for High-Level Contention Models
Emerging single-chip heterogeneous multiprocessors feature hundreds of design elements contending for shared resources, making it difficult to isolate performance impacts of indiv...
Alex Bobrek, JoAnn M. Paul, Donald E. Thomas
ICCD
2006
IEEE
104views Hardware» more  ICCD 2006»
15 years 6 months ago
Guiding Architectural SRAM Models
— Caches, block memories, predictors, state tables, and other forms of on-chip memory are continuing to consume a greater portion of processor designs with each passing year. Mak...
Banit Agrawal, Timothy Sherwood
CHI
2010
ACM
15 years 4 months ago
End-user mashup programming: through the design lens
Programming has recently become more common among ordinary end users of computer systems. We believe that these end-user programmers are not just coders but also designers, in tha...
Jill Cao, Yann Riche, Susan Wiedenbeck, Margaret M...
85
Voted
ICTAI
2009
IEEE
15 years 4 months ago
Preventing Unwanted Social Inferences with Classification Tree Analysis
A serious threat to user privacy in new mobile and web2.0 applications stems from ‘social inferences’. These unwanted inferences are related to the users’ identity, current ...
Sara Motahari, Sotirios G. Ziavras, Quentin Jones