Sciweavers

861 search results - page 62 / 173
» Predicting Attack-prone Components
Sort
View
113
Voted
PAKDD
2004
ACM
127views Data Mining» more  PAKDD 2004»
15 years 6 months ago
Exploiting Recurring Usage Patterns to Enhance Filesystem and Memory Subsystem Performance
In many cases, normal uses of a system form patterns that will repeat. The most common patterns can be collected into a prediction model which will essentially predict that usage p...
Benjamin Rutt, Srinivasan Parthasarathy
114
Voted
JCB
2007
97views more  JCB 2007»
15 years 21 days ago
Parsing Nucleic Acid Pseudoknotted Secondary Structure: Algorithm and Applications
Accurate prediction of pseudoknotted nucleic acid secondary structure is an important computational challenge. Prediction algorithms based on dynamic programming aim to find a st...
Baharak Rastegari, Anne Condon
SECON
2010
IEEE
14 years 10 months ago
Cloudy Computing: Leveraging Weather Forecasts in Energy Harvesting Sensor Systems
To sustain perpetual operation, systems that harvest environmental energy must carefully regulate their usage to satisfy their demand. Regulating energy usage is challenging if a s...
Navin Sharma, Jeremy Gummeson, David Irwin, Prasha...
99
Voted
NIPS
2007
15 years 2 months ago
Congruence between model and human attention reveals unique signatures of critical visual events
Current computational models of bottom-up and top-down components of attention are predictive of eye movements across a range of stimuli and of simple, fixed visual tasks (such a...
Robert J. Peters, Laurent Itti
81
Voted
ICIP
2005
IEEE
16 years 2 months ago
An adaptive linear system framework for image distortion analysis
We describe a framework for decomposing the distortion between two images into a linear combination of components. Unlike conventional linear bases such as those in Fourier or wav...
Zhou Wang, Eero P. Simoncelli