Sciweavers

7431 search results - page 1422 / 1487
» Temporal Information Extraction
Sort
View
HIPC
2009
Springer
14 years 9 months ago
Detailed analysis of I/O traces for large scale applications
- In this paper, we present a tool to extract I/O traces from very large applications running at full scale during their production runs. We analyze these traces to gain informatio...
Nithin Nakka, Alok N. Choudhary, Wei-keng Liao, Le...
ICIP
2009
IEEE
14 years 9 months ago
Selecting representative and distinctive descriptors for efficient landmark recognition
To have a robust and informative image content representation for image categorization, we often need to extract as many as possible visual features at various locations, scales a...
Sheng Gao, Joo-Hwee Lim
ICISC
2009
132views Cryptology» more  ICISC 2009»
14 years 9 months ago
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Abstract. The design of embedded processors demands a careful tradeoff between many conflicting objectives such as performance, silicon area and power consumption. Finding such a t...
Johann Großschädl, Elisabeth Oswald, Da...
IEPOL
2010
130views more  IEPOL 2010»
14 years 9 months ago
Piracy or promotion? The impact of broadband Internet penetration on DVD sales
ABSTRACT Digital computer networks represent a disruptive technology, with the potential to create or destroy economic value in established industries. These opportunities and chal...
Michael D. Smith, Rahul Telang
IANDC
2011
148views more  IANDC 2011»
14 years 6 months ago
Building species trees from larger parts of phylogenomic databases
Abstract. Gene trees are leaf-labeled trees inferred from molecular sequences. Due to duplication events arising in genome evolution, gene trees usually have multiple copies of som...
Celine Scornavacca, Vincent Berry, Vincent Ranwez
« Prev « First page 1422 / 1487 Last » Next »