Sciweavers

882 search results - page 165 / 177
» Observing Infinite-dimensional Dynamical Systems
Sort
View
109
Voted
CIVR
2009
Springer
145views Image Analysis» more  CIVR 2009»
15 years 8 months ago
Jointly optimising relevance and diversity in image retrieval
In this paper we present a method to jointly optimise the relevance and the diversity of the results in image retrieval. Without considering diversity, image retrieval systems oft...
Thomas Deselaers, Tobias Gass, Philippe Dreuw, Her...
ICN
2009
Springer
15 years 8 months ago
Measuring Route Diversity in the Internet from Remote Vantage Points
Recent works on modeling the Internet topology [8, 9] have highlighted how the complexity of relationships between Autonomous Systems (ASes) can not be oversimplified without sac...
Andrea Di Menna, Tiziana Refice, Luca Cittadini, G...
ACSAC
2008
IEEE
15 years 8 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
ICDCS
2008
IEEE
15 years 8 months ago
Resource Bundles: Using Aggregation for Statistical Wide-Area Resource Discovery and Allocation
Resource discovery is an important process for finding suitable nodes that satisfy application requirements in large loosely-coupled distributed systems. Besides inter-node heter...
Michael Cardosa, Abhishek Chandra
MICRO
2008
IEEE
136views Hardware» more  MICRO 2008»
15 years 8 months ago
Power to the people: Leveraging human physiological traits to control microprocessor frequency
Any architectural optimization aims at satisfying the end user. However, modern architectures execute with little to no knowledge about the individual user. If architectures could...
Alex Shye, Yan Pan, Benjamin Scholbrock, J. Scott ...