Sciweavers

8294 search results - page 1289 / 1659
» Presenting Data from Experiments in Algorithmics
Sort
View
CCS
2006
ACM
15 years 8 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
USENIX
2007
15 years 7 months ago
Virtual Machine Memory Access Tracing with Hypervisor Exclusive Cache
Virtual machine (VM) memory allocation and VM consolidation can benefit from the prediction of VM page miss rate at each candidate memory size. Such prediction is challenging for...
Pin Lu, Kai Shen
MM
2010
ACM
200views Multimedia» more  MM 2010»
15 years 5 months ago
Multimodal location estimation
In this article we define a multimedia content analysis problem, which we call multimodal location estimation: Given a video/image/audio file, the task is to determine where it wa...
Gerald Friedland, Oriol Vinyals, Trevor Darrell
146
Voted
BMCBI
2006
114views more  BMCBI 2006»
15 years 5 months ago
A high level interface to SCOP and ASTRAL implemented in Python
Background: Benchmarking algorithms in structural bioinformatics often involves the construction of datasets of proteins with given sequence and structural properties. The SCOP da...
James A. Casbon, Gavin E. Crooks, Mansoor A. S. Sa...
IS
2006
15 years 4 months ago
Processing approximate aggregate queries in wireless sensor networks
In-network data aggregation has been recently proposed as an effective means to reduce the number of messages exchanged in wireless sensor networks. Nodes of the network form an a...
Antonios Deligiannakis, Yannis Kotidis, Nick Rouss...
« Prev « First page 1289 / 1659 Last » Next »