Sciweavers

558 search results - page 66 / 112
» Safe and Effective Determinant Evaluation
Sort
View
FAST
2011
14 years 3 months ago
A Scheduling Framework That Makes Any Disk Schedulers Non-Work-Conserving Solely Based on Request Characteristics
Exploiting spatial locality is critical for a disk scheduler to achieve high throughput. Because of the high cost of disk head seeks and the non-preemptible nature of request serv...
Yuehai Xu, Song Jiang
ICPR
2008
IEEE
16 years 1 months ago
A method of feature selection using contribution ratio based on boosting
AdaBoost and support vector machines (SVM) algorithms are commonly used in the field of object recognition. As classifiers, their classification performance is sensitive to affect...
Masamitsu Tsuchiya, Hironobu Fujiyoshi
EUROCRYPT
2009
Springer
16 years 12 days ago
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this...
François-Xavier Standaert, Moti Yung, Tal M...
HICSS
2009
IEEE
129views Biometrics» more  HICSS 2009»
15 years 6 months ago
Using Collaborative Filtering Algorithms as eLearning Tools
Collaborative information filtering techniques play a key role in many Web 2.0 applications. While they are currently mainly used for business purposes such as product recommendat...
Frank Loll, Niels Pinkwart
HICSS
2009
IEEE
116views Biometrics» more  HICSS 2009»
15 years 6 months ago
Systems Modeling for IP-Based Handoff Using Timed Petri Nets
The mechanisms and design principles needed for achieving optimized handoff for mobile Internet services are poorly understood and need better analysis. This paper contributes to ...
Ashutosh Dutta, Bryan Lyles, Henning Schulzrinne, ...