Sciweavers

606 search results - page 114 / 122
» Memory-constrained aggregate computation over data streams
Sort
View
MM
2003
ACM
133views Multimedia» more  MM 2003»
15 years 2 months ago
Real-time compression for dynamic 3D environments
The goal of tele-immersion has long been to enable people at remote locations to share a sense of presence. A tele-immersion system acquires the 3D representation of a collaborato...
Sang-Uok Kum, Ketan Mayer-Patel, Henry Fuchs
KDD
2012
ACM
181views Data Mining» more  KDD 2012»
12 years 12 months ago
On "one of the few" objects
Objects with multiple numeric attributes can be compared within any “subspace” (subset of attributes). In applications such as computational journalism, users are interested i...
You Wu, Pankaj K. Agarwal, Chengkai Li, Jun Yang 0...
97
Voted
ISPASS
2003
IEEE
15 years 2 months ago
Accelerating private-key cryptography via multithreading on symmetric multiprocessors
Achieving high performance in cryptographic processing is important due to the increasing connectivity among today’s computers. Despite steady improvements in microprocessor and...
Praveen Dongara, T. N. Vijaykumar
CHI
2002
ACM
15 years 9 months ago
NetRaker suite: a demonstration
This demonstration will show the application of a unique approach to collecting and analyzing usability data from the users of Web sites and software applications. The NetRaker Su...
Doug van Duyne, James A. Landay, Matthew Tarpy
DAWAK
2007
Springer
15 years 3 months ago
Mining Top-K Multidimensional Gradients
Several business applications such as marketing basket analysis, clickstream analysis, fraud detection and churning migration analysis demand gradient data analysis. By employing g...
Ronnie Alves, Orlando Belo, Joel Ribeiro