Sciweavers

14244 search results - page 2469 / 2849
» Modeling Program Predictability
Sort
View
128
Voted
ERSA
2009
109views Hardware» more  ERSA 2009»
15 years 1 months ago
An Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors
An increasing number of embedded system solutions in space, military, and consumer electronics applications rely on processor cores inside reconfigurable logic devices. Ensuring da...
Austin Rogers, Aleksandar Milenkovic
151
Voted
ICSOC
2009
Springer
15 years 1 months ago
Lightweight Composition of Ad-Hoc Enterprise-Class Applications with Context-Aware Enterprise Mashups
The huge demand for ad-hoc and situational enterprise-class applications led to a new kind of Web-based applications, known as enterprise mashups. End users from the business units...
Florian Gilles, Volker Hoyer, Till Janner, Katarin...
138
Voted
IFIP12
2009
15 years 1 months ago
Mining Retail Transaction Data for Targeting Customers with Headroom - A Case Study
We outline a method to model customer behavior from retail transaction data. In particular, we focus on the problem of recommending relevant products to consumers. Addressing this ...
Madhu Shashanka, Michael Giering
119
Voted
ENTCS
2010
88views more  ENTCS 2010»
15 years 1 months ago
Range and Set Abstraction using SAT
d Set Abstraction using SAT Edd Barrett Andy King School of Computing, University of Kent, CT2 7NF, UK Symbolic decision trees are not the only way to correlate the relationship b...
Edd Barrett, Andy King
154
Voted
CVPR
2011
IEEE
14 years 11 months ago
Discriminative Image Warping with Attribute Flow
We address the problem of finding deformation between two images for the purpose of recognizing objects. The challenge is that discriminative features are often transformation-va...
Weiyu Zhang, Praveen Srinivasan, Jianbo Shi
« Prev « First page 2469 / 2849 Last » Next »