Sciweavers

1923 search results - page 327 / 385
» Modeling Complexity in Secure Distributed Computing
Sort
View
SPAA
1998
ACM
15 years 1 months ago
Lamport Clocks: Verifying a Directory Cache-Coherence Protocol
Modern shared-memory multiprocessors use complex memory system implementations that include a variety of non-trivial and interacting optimizations. More time is spent in verifying...
Manoj Plakal, Daniel J. Sorin, Anne Condon, Mark D...
ECCV
2008
Springer
15 years 11 months ago
Similarity Features for Facial Event Analysis
Each facial event will give rise to complex facial appearance variation. In this paper, we propose similarity features to describe the facial appearance for video-based facial even...
Peng Yang, Qingshan Liu, Dimitris N. Metaxas
MICCAI
2006
Springer
15 years 10 months ago
The Entire Regularization Path for the Support Vector Domain Description
Abstract. The support vector domain description is a one-class classification method that estimates the shape and extent of the distribution of a data set. This separates the data ...
Karl Sjöstrand, Rasmus Larsen
SAC
2009
ACM
15 years 4 months ago
Enhancing XML data warehouse query performance by fragmentation
XML data warehouses form an interesting basis for decisionsupport applications that exploit heterogeneous data from multiple sources. However, XML-native database systems currentl...
Hadj Mahboubi, Jérôme Darmont
GCC
2005
Springer
15 years 3 months ago
A Mathematical Foundation for Topology Awareness of P2P Overlay Networks
Abstract. In peer-to-peer (P2P) overlay networks, the mechanism of a peer randomly joining and leaving a network, causes a topology mismatch between the overlay and the underlying ...
Habib Rostami, Jafar Habibi