Sciweavers

260 search results - page 34 / 52
» Industry-scale duplicate detection
Sort
View
CF
2004
ACM
15 years 3 months ago
Designing and testing fault-tolerant techniques for SRAM-based FPGAs
This paper discusses fault-tolerant techniques for SRAM-based FPGAs. These techniques can be based on circuit level modifications, with obvious modifications in the programmable a...
Fernanda Lima Kastensmidt, Gustavo Neuberger, Luig...
CLEANDB
2006
ACM
312views Database» more  CLEANDB 2006»
15 years 1 months ago
Efficiently Filtering RFID Data Streams
RFID holds the promise of real-time identifying, locating, tracking and monitoring physical objects without line of sight, and can be used for a wide range of pervasive computing ...
Yijian Bai, Fusheng Wang, Peiya Liu
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
15 years 4 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
99
Voted
JCB
2007
146views more  JCB 2007»
14 years 9 months ago
MSOAR: A High-Throughput Ortholog Assignment System Based on Genome Rearrangement
The assignment of orthologous genes between a pair of genomes is a fundamental and challenging problem in comparative genomics, since many computational methods for solving variou...
Zheng Fu, Xin Chen, Vladimir Vacic, Peng Nan, Yang...
MM
2004
ACM
137views Multimedia» more  MM 2004»
15 years 3 months ago
Towards auto-documentary: tracking the evolution of news stories
News videos constitute an important source of information for tracking and documenting important events. In these videos, news stories are often accompanied by short video shots t...
Pinar Duygulu, Jia-Yu Pan, David A. Forsyth