Sciweavers

201 search results - page 28 / 41
» Scalability analysis of SPMD codes using expectations
Sort
View
SE
2008
15 years 3 months ago
Eliminating Trust From Application Programs By Way Of Software Architecture
: In many of today's application programs, security functionality is inseparably intertwined with the actual mission-purpose logic. As a result, the trusted code base is unnec...
Michael Franz
ICCV
2005
IEEE
16 years 3 months ago
Creating Efficient Codebooks for Visual Recognition
Visual codebook based quantization of robust appearance descriptors extracted from local image patches is an effective means of capturing image statistics for texture analysis and...
Bill Triggs, Frédéric Jurie
ICSM
2006
IEEE
15 years 8 months ago
Reverse Engineering Method Stereotypes
An approach to automatically identify the stereotypes of all the methods in an entire system is presented. A taxonomy for object-oriented class method stereotypes is given that un...
Natalia Dragan, Michael L. Collard, Jonathan I. Ma...
IADIS
2003
15 years 3 months ago
Informatization and E-Business Model Application for Distributed Data Mining Using Mobile Agents
Distributed data mining (DDM) is the semi-automatic pattern extraction of distributed data sources. The next generation of the data mining studies will be distributed data mining ...
Ezendu Ifeanyi Ariwa, Mohamed B. Senousy, Mohamed ...
ICC
2007
IEEE
15 years 8 months ago
A Novel Transmitter-Based Selective-Precoding Technique for DS/CDMA Systems
— In this paper a new transmitter precoding technique is presented that outperforms conventional precoding by making use of a portion of the interference between the users in a C...
Christos Masouros, Emad Alsusa