Sciweavers

14761 search results - page 2884 / 2953
» Optimization in Data Mining
Sort
View
ISMM
2009
Springer
15 years 4 months ago
Discrete Driver Assistance
Applying computer technology, such as computer vision in driver assistance, implies that processes and data are modeled as being discretized rather than being continuous. The area ...
Reinhard Klette, Ruyi Jiang, Sandino Morales, Tobi...
CF
2009
ACM
15 years 4 months ago
Core monitors: monitoring performance in multicore processors
As we reach the limits of single-core computing, we are promised more and more cores in our systems. Modern architectures include many performance counters per core, but few or no...
Paul E. West, Yuval Peress, Gary S. Tyson, Sally A...
ISBRA
2010
Springer
15 years 4 months ago
Uncovering Hidden Phylogenetic Consensus
Abstract. Many of the steps in phylogenetic reconstruction can be confounded by “rogue” taxa, taxa that cannot be placed with assurance anywhere within the tree—whose locatio...
Nicholas D. Pattengale, Krister M. Swenson, Bernar...
ACSAC
2008
IEEE
15 years 4 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
CODES
2008
IEEE
15 years 4 months ago
Speculative DMA for architecturally visible storage in instruction set extensions
Instruction set extensions (ISEs) can accelerate embedded processor performance. Many algorithms for ISE generation have shown good potential; some of them have recently been expa...
Theo Kluter, Philip Brisk, Paolo Ienne, Edoardo Ch...
« Prev « First page 2884 / 2953 Last » Next »