Sciweavers

777 search results - page 138 / 156
» The Refined Process Structure Tree
Sort
View
133
Voted
EUROPAR
2007
Springer
15 years 9 months ago
Compositional Approach Applied to Loop Specialization
An optimizing compiler has a hard time to generate a code which will perform at top speed for an arbitrary data set size. In general, the low level optimization process must take i...
Lamia Djoudi, Jean-Thomas Acquaviva, Denis Barthou
FASE
2007
Springer
15 years 9 months ago
EQ-Mine: Predicting Short-Term Defects for Software Evolution
We use 63 features extracted from sources such as versioning and issue tracking systems to predict defects in short time frames of two months. Our multivariate approach covers aspe...
Jacek Ratzinger, Martin Pinzger, Harald Gall
142
Voted
ACCV
2006
Springer
15 years 9 months ago
Inverse Volume Rendering Approach to 3D Reconstruction from Multiple Images
This paper presents a method of image-based 3D modeling for intricately-shaped objects, such as a fur, tree leaves and human hair. We formulate the imaging process of these small g...
Shuntaro Yamazaki, Masaaki Mochimaru, Takeo Kanade
117
Voted
SAC
2006
ACM
15 years 9 months ago
Approaches to text mining for clinical medical records
Clinical medical records contain a wealth of information, largely in free-text form. Means to extract structured information from free-text records is an important research endeav...
Xiaohua Zhou, Hyoil Han, Isaac Chankai, Ann Prestr...
118
Voted
FCCM
2005
IEEE
102views VLSI» more  FCCM 2005»
15 years 9 months ago
A Signature Match Processor Architecture for Network Intrusion Detection
In this paper, we introduce a novel architecture for a hardware based network intrusion detection system (NIDS). NIDSs are becoming critical components of the network infrastructu...
Janardhan Singaraju, Long Bu, John A. Chandy