Sciweavers

1083 search results - page 133 / 217
» The limits of localization using RSS
Sort
View
162
Voted
PAKDD
2005
ACM
160views Data Mining» more  PAKDD 2005»
15 years 10 months ago
Improving Mining Quality by Exploiting Data Dependency
The usefulness of the results produced by data mining methods can be critically impaired by several factors such as (1) low quality of data, including errors due to contamination, ...
Fang Chu, Yizhou Wang, Carlo Zaniolo, Douglas Stot...
PARA
2004
Springer
15 years 10 months ago
Cache Optimizations for Iterative Numerical Codes Aware of Hardware Prefetching
Cache optimizations typically include code transformations to increase the locality of memory accesses. An orthogonal approach is to enable for latency hiding by introducing prefet...
Josef Weidendorfer, Carsten Trinitis
SIBGRAPI
2003
IEEE
15 years 10 months ago
A Hole-Filling Strategy for Reconstruction of Smooth Surfaces in Range Images
Creating models of real scenes is a complex task for which the use of traditional modelling techniques is inappropriate. For this task, laser rangefinders are frequently used to s...
Jianning Wang, Manuel M. Oliveira
112
Voted
DATE
2002
IEEE
166views Hardware» more  DATE 2002»
15 years 9 months ago
Event Model Interfaces for Heterogeneous System Analysis
Complex embedded systems consist of hardware and software components from different domains, such as control and signal processing, many of them supplied by different IP vendors. ...
Kai Richter, Rolf Ernst
140
Voted
ACSAC
2004
IEEE
15 years 8 months ago
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks
Mobile ad hoc network routing protocols are highly susceptible to subversion. Previous research in securing these protocols has typically used techniques based on encryption and r...
Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan,...