Sciweavers

10910 search results - page 1924 / 2182
» Input modeling using a computer algebra system
Sort
View
MOBIHOC
2010
ACM
15 years 2 months ago
Data preservation under spatial failures in sensor networks
In this paper, we address the problem of preserving generated data in a sensor network in case of node failures. We focus on the type of node failures that have explicit spatial s...
Navid Hamed Azimi, Himanshu Gupta, Xiaoxiao Hou, J...
CVPR
2012
IEEE
13 years 7 months ago
Discovering localized attributes for fine-grained recognition
Attributes are visual concepts that can be detected by machines, understood by humans, and shared across categories. They are particularly useful for fine-grained domains where c...
Kun Duan, Devi Parikh, David J. Crandall, Kristen ...
165
Voted
CF
2006
ACM
15 years 11 months ago
Dynamic thread assignment on heterogeneous multiprocessor architectures
In a multi-programmed computing environment, threads of execution exhibit different runtime characteristics and hardware resource requirements. Not only do the behaviors of distin...
Michela Becchi, Patrick Crowley
BMCBI
2007
109views more  BMCBI 2007»
15 years 5 months ago
TABASCO: A single molecule, base-pair resolved gene expression simulator
Background: Experimental studies of gene expression have identified some of the individual molecular components and elementary reactions that comprise and control cellular behavio...
Sriram Kosuri, Jason R. Kelly, Drew Endy
RAID
1999
Springer
15 years 9 months ago
Combining Knowledge Discovery and Knowledge Engineering to Build IDSs
We have been developing a data mining (i.e., knowledge discovery) framework, MADAM ID, for Mining Audit Data for Automated Models for Intrusion Detection [LSM98, LSM99b, LSM99a]. ...
Wenke Lee, Salvatore J. Stolfo
« Prev « First page 1924 / 2182 Last » Next »