Sciweavers

885 search results - page 147 / 177
» Large-scale behavioral targeting
Sort
View
142
Voted
ICPP
2009
IEEE
14 years 7 months ago
Using Coherence Information and Decay Techniques to Optimize L2 Cache Leakage in CMPs
This paper evaluates several techniques to save leakage in CMP L2 caches by selectively switching off the less used lines. We primarily focus on private snoopy L2 caches. In this c...
Matteo Monchiero, Ramon Canal, Antonio Gonzá...
ICSOC
2009
Springer
14 years 7 months ago
EC2 Performance Analysis for Resource Provisioning of Service-Oriented Applications
Abstract. Cloud computing is receiving increasingly attention as it provides infinite resource capacity and "pay-as-you-go" resource usage pattern to hosted applications....
Dejun Jiang, Guillaume Pierre, Chi-Hung Chi
93
Voted
ICDM
2010
IEEE
235views Data Mining» more  ICDM 2010»
14 years 7 months ago
Content-Based Methods for Predicting Web-Site Demographic Attributes
Demographic information plays an important role in gaining valuable insights about a web-site's user-base and is used extensively to target online advertisements and promotion...
Santosh Kabbur, Eui-Hong Han, George Karypis
TSE
2010
230views more  TSE 2010»
14 years 4 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...
CVPR
2011
IEEE
14 years 3 months ago
A Two-Stage Reconstruction Approach for Seeing Through Water
Several attempts have been lately proposed to tackle the problem of recovering the original image of an underwater scene using a sequence distorted by water waves. The main draw...
Omar Oreifej, Guang Shu, Teresa Pace, and Mubarak ...