Sciweavers

1937 search results - page 353 / 388
» Rule Based Updates on Simple Knowledge Bases
Sort
View
SIGMETRICS
2008
ACM
116views Hardware» more  SIGMETRICS 2008»
15 years 1 months ago
Towards realistic file-system benchmarks with CodeMRI
Benchmarks are crucial to understanding software systems and assessing their performance. In file-system research, synthetic benchmarks are accepted and widely used as substitutes...
Nitin Agrawal, Andrea C. Arpaci-Dusseau, Remzi H. ...
TVCG
2008
86views more  TVCG 2008»
15 years 1 months ago
The Shaping of Information by Visual Metaphors
The nature of an information visualization can be considered to lie in the visual metaphors it uses to structure information. The process of understanding a visualization therefore...
Caroline Ziemkiewicz, Robert Kosara
JEI
2008
128views more  JEI 2008»
15 years 1 months ago
Practical use of receiver operating characteristic analysis to assess the performances of defect detection algorithms
Defect detection in images is a current task in quality control and is often integrated in partially or fully automated systems. Assessing the performances of defect detection algo...
Yann Le Meur, Jean-Michel Vignolle, Jocelyn Chanus...
PUC
2010
114views more  PUC 2010»
15 years 9 days ago
Mobile phone-based pervasive fall detection
Falls are a major health risk that diminishes the quality of life among the elderly people. The importance of fall detection increases as the elderly population surges, especially ...
Jiangpeng Dai, Xiaole Bai, Zhimin Yang, Zhaohui Sh...
IJNSEC
2010
324views more  IJNSEC 2010»
14 years 8 months ago
Computing the Modular Inverse of a Polynomial Function over GF(2P) Using Bit Wise Operation
Most public key crypto systems use finite field modulo arithmetic. This modulo arithmetic is applied on real numbers, binary values and polynomial functions. The computation cost ...
Rajaram Ramasamy, Amutha Prabakar Muniyandi