Sciweavers

8468 search results - page 1354 / 1694
» The Technology of Data Stashing
Sort
View
DAMON
2009
Springer
15 years 6 months ago
A new look at the roles of spinning and blocking
Database engines face growing scalability challenges as core counts exponentially increase each processor generation, and the efficiency of synchronization primitives used to prot...
Ryan Johnson, Manos Athanassoulis, Radu Stoica, An...
ICISS
2009
Springer
15 years 6 months ago
Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles
Many peer-assisted content-distribution systems reward a peer based on the amount of data that this peer serves to others. However, validating that a peer did so is, to our knowled...
Michael K. Reiter, Vyas Sekar, Chad Spensky, Zheng...
IDA
2009
Springer
15 years 6 months ago
Cumulative State Coherence Transform for a Robust Two-Channel Multiple Source Localization
This work presents a novel robust method for a two-channel multiple Time Difference of Arrival (TDOA) estimation. The method is based on a recursive frequency-domain Independent C...
Francesco Nesta, Piergiorgio Svaizer, Maurizio Omo...
IDA
2009
Springer
15 years 6 months ago
Learning Natural Image Structure with a Horizontal Product Model
We present a novel extension to Independent Component Analysis (ICA), where the data is generated as the product of two submodels, each of which follow an ICA model, and which comb...
Urs Köster, Jussi T. Lindgren, Michael Gutman...
IDA
2009
Springer
15 years 6 months ago
Estimating Markov Random Field Potentials for Natural Images
Markov Random Field (MRF) models with potentials learned from the data have recently received attention for learning the low-level structure of natural images. A MRF provides a pri...
Urs Köster, Jussi T. Lindgren, Aapo Hyvä...
« Prev « First page 1354 / 1694 Last » Next »