Sciweavers

1015 search results - page 9 / 203
» The data locality of work stealing
Sort
View
APVIS
2010
14 years 9 months ago
Interactive local clustering operations for high dimensional data in parallel coordinates
In this paper, we propose an approach of clustering data in parallel coordinates through interactive local operations. Different from many other methods in which clustering is glo...
Peihong Guo, He Xiao, Zuchao Wang, Xiaoru Yuan
MICCAI
2007
Springer
16 years 20 days ago
Accuracy Assessment of Global and Local Atrophy Measurement Techniques with Realistic Simulated Longitudinal Data
The main goal of this work was to assess the accuracy of several well-known methods which provide global (BSI and SIENA) or local (Jacobian integration) estimates of longitudinal a...
Oscar Camara, Rachael I. Scahill, Julia A. Schnabe...
USENIX
2007
15 years 2 months ago
Dynamic Spyware Analysis
Spyware is a class of malicious code that is surreptitiously installed on victims’ machines. Once active, it silently monitors the behavior of users, records their web surfing ...
Manuel Egele, Christopher Kruegel, Engin Kirda, He...
IPPS
2010
IEEE
14 years 9 months ago
Profitability-based power allocation for speculative multithreaded systems
With the shrinking of transistors continuing to follow Moore's Law and the non-scalability of conventional outof-order processors, multi-core systems are becoming the design ...
Polychronis Xekalakis, Nikolas Ioannou, Salman Kha...
CCS
2009
ACM
15 years 4 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...