Sciweavers

66 search results - page 9 / 14
» Performance evaluation of event detection solutions: the CRE...
Sort
View
PLDI
1999
ACM
15 years 1 months ago
Load-Reuse Analysis: Design and Evaluation
Load-reuse analysis finds instructions that repeatedly access the same memory location. This location can be promoted to a register, eliminating redundant loads by reusing the re...
Rastislav Bodík, Rajiv Gupta, Mary Lou Soff...
92
Voted
TRECVID
2008
14 years 11 months ago
University of Sheffield at TRECVID 2008: Rushes Summarisation and Video Copy Detection
This paper presents our experiments on TRECVID workshop 2008. This year we participated in two challenging tasks, rushes video summarisation and video copy detection tasks. We stu...
Siripinyo Chantamunee, Yoshihiko Gotoh
ISI
2007
Springer
14 years 9 months ago
Host Based Intrusion Detection using Machine Learning
—Detecting unknown malicious code (malcode) is a challenging task. Current common solutions, such as anti-virus tools, rely heavily on prior explicit knowledge of specific instan...
Robert Moskovitch, Shay Pluderman, Ido Gus, Dima S...
65
Voted
CGO
2010
IEEE
15 years 2 months ago
Contention aware execution: online contention detection and response
Cross-core application interference due to contention for shared on-chip and off-chip resources pose a significant challenge to providing application level quality of service (Qo...
Jason Mars, Neil Vachharajani, Robert Hundt, Mary ...
HICSS
2009
IEEE
143views Biometrics» more  HICSS 2009»
15 years 4 months ago
Instance Data Evaluation for Semantic Web-Based Knowledge Management Systems
As semantic web technologies are increasingly used to empower knowledge management systems (KMSs), there is a growing need for mechanisms and automated tools for checking content ...
Jiao Tao, Li Ding, Deborah L. McGuinness