Sciweavers

390 search results - page 70 / 78
» Performance Analysis of the Active Object Pattern in Middlew...
Sort
View
ICWE
2009
Springer
15 years 4 months ago
Trust and Reputation Mining in Professional Virtual Communities
Abstract. Communication technologies, such as e-mail, instant messaging, discussion forums, blogs, and newsgroups connect people together, forming virtual communities. This concept...
Florian Skopik, Hong Linh Truong, Schahram Dustdar
84
Voted
IBPRIA
2007
Springer
15 years 3 months ago
Haar Wavelets and Edge Orientation Histograms for On-Board Pedestrian Detection
On–board pedestrian detection is a key task in advanced driver assistance systems. It involves dealing with aspect–changing objects in cluttered environments, and working in a ...
David Gerónimo, Antonio M. López, Da...
86
Voted
ACMMSP
2005
ACM
99views Hardware» more  ACMMSP 2005»
15 years 3 months ago
Gated memory control for memory monitoring, leak detection and garbage collection
ct In the past, program monitoring often operates at the code level, performing checks at function and loop boundaries. Recent research shows that profiling analysis can identify ...
Chen Ding, Chengliang Zhang, Xipeng Shen, Mitsunor...
90
Voted
MOBIHOC
2010
ACM
14 years 7 months ago
Data preservation under spatial failures in sensor networks
In this paper, we address the problem of preserving generated data in a sensor network in case of node failures. We focus on the type of node failures that have explicit spatial s...
Navid Hamed Azimi, Himanshu Gupta, Xiaoxiao Hou, J...
EDM
2009
184views Data Mining» more  EDM 2009»
14 years 7 months ago
Process Mining Online Assessment Data
Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated throug...
Mykola Pechenizkiy, Nikola Trcka, Ekaterina Vasily...