Sciweavers

2006 search results - page 123 / 402
» Heuristic Security-Testing Methods
Sort
View
ICIP
2008
IEEE
16 years 2 months ago
Learning distance metric for semi-supervised image segmentation
Semi-supervised image segmentation is an important issue in many image processing applications, and has been a popular research area recently, the most popular are graph-based met...
Yangqing Jia, Changshui Zhang
117
Voted
TREC
2003
15 years 2 months ago
Experiments in TREC 2003 Genomics Track at NTT
500,000 PubMed abstracts. However, less than 50 documents are relevant for most queries. Applying scoring to all 500,000 abstracts would create a lot of noise. In the first step, ...
Hirotoshi Taira, Tomonori Izumitani, Tsutomu Hirao...
WEA
2010
Springer
284views Algorithms» more  WEA 2010»
15 years 7 months ago
Paging Multiple Users in Cellular Network: Yellow Page and Conference Call Problems
Abstract. Mobile users are roaming in a zone of cells in a cellular network system. The probabilities of each user residing in each cell are known, and all probabilities are indepe...
Amotz Bar-Noy, Panagiotis Cheilaris, Yi Feng 0002
AAIM
2007
Springer
97views Algorithms» more  AAIM 2007»
15 years 4 months ago
Efficiency of Data Distribution in BitTorrent-Like Systems
BitTorrent (BT) in practice is a very efficient method to share data over a network of clients. In this paper we extend the recent work of Arthur and Panigrahy [1] on modelling the...
Ho-Leung Chan, Tak Wah Lam, Prudence W. H. Wong
CC
2010
Springer
117views System Software» more  CC 2010»
15 years 7 months ago
Punctual Coalescing
Compilers use register coalescing to avoid generating code for copy instructions. For architectures with register aliasing such as x86, Smith, Ramsey, and Holloway (2004) presented...
Fernando Magno Quintão Pereira, Jens Palsbe...