Sciweavers

2500 search results - page 355 / 500
» Specifying Behavior in C
Sort
View
131
Voted
CHI
2009
ACM
16 years 4 months ago
Investigating web search strategies and forum use to support diet and weight loss
Healthcare is shifting from being reactive to preventive, with a focus on maintaining general wellness through positive decisions on diet, exercise, and lifestyle. In this paper, ...
m. c. schraefel, Ryen W. White, Paul André,...
122
Voted
VLSID
2008
IEEE
151views VLSI» more  VLSID 2008»
16 years 4 months ago
Predictable Implementation of Real-Time Applications on Multiprocessor Systems-on-Chip
Worst-case execution time (WCET) analysis and, in general, the predictability of real-time applications implemented on multiprocessor systems has been addressed only in very restri...
Alexandru Andrei, Petru Eles, Zebo Peng, Jakob Ros...
125
Voted
OSDI
2008
ACM
16 years 3 months ago
FlightPath: Obedience vs. Choice in Cooperative Services
: We present FlightPath, a novel peer-to-peer streaming application that provides a highly reliable data stream to a dynamic set of peers. We demonstrate that FlightPath reduces ji...
Harry C. Li, Allen Clement, Mirco Marchetti, Manos...
VLDB
2005
ACM
153views Database» more  VLDB 2005»
16 years 3 months ago
An effective and efficient algorithm for high-dimensional outlier detection
Abstract. The outlier detection problem has important applications in the field of fraud detection, network robustness analysis, and intrusion detection. Most such applications are...
Charu C. Aggarwal, Philip S. Yu
SIGMOD
2001
ACM
142views Database» more  SIGMOD 2001»
16 years 3 months ago
Outlier Detection for High Dimensional Data
The outlier detection problem has important applications in the eld of fraud detection, network robustness analysis, and intrusion detection. Most such applications are high dimen...
Charu C. Aggarwal, Philip S. Yu