Sciweavers

671 search results - page 76 / 135
» On Observing and Constraining Active Systems
Sort
View
CASES
2007
ACM
15 years 4 months ago
Stack size reduction of recursive programs
For memory constrained environments like embedded systems, optimization for program size is often as important, if not more important, as optimization for execution speed. Commonl...
Stefan Schäckeler, Weijia Shang
99
Voted
ICDM
2010
IEEE
115views Data Mining» more  ICDM 2010»
14 years 10 months ago
Polishing the Right Apple: Anytime Classification Also Benefits Data Streams with Constant Arrival Times
Classification of items taken from data streams requires algorithms that operate in time sensitive and computationally constrained environments. Often, the available time for class...
Jin Shieh, Eamonn J. Keogh
118
Voted
RECSYS
2009
ACM
15 years 7 months ago
Learning to recommend with trust and distrust relationships
With the exponential growth of Web contents, Recommender System has become indispensable for discovering new information that might interest Web users. Despite their success in th...
Hao Ma, Michael R. Lyu, Irwin King
ACISP
2006
Springer
15 years 6 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros
108
Voted
CVPR
1997
IEEE
15 years 4 months ago
Multi-Modal Tracking of Faces for Video Communications
This paper describes a system which uses multiple visual processes to detect and track faces for video compression and transmission. The system is based on an architecture in whic...
James L. Crowley, François Bérard