Sciweavers

2316 search results - page 302 / 464
» The many forms of hypercomputation
Sort
View
169
Voted
SP
2008
IEEE
140views Security Privacy» more  SP 2008»
15 years 5 months ago
Knowledge support and automation for performance analysis with PerfExplorer 2.0
The integration of scalable performance analysis in parallel development tools is difficult. The potential size of data sets and the need to compare results from multiple experime...
Kevin A. Huck, Allen D. Malony, Sameer Shende, Ala...
TASLP
2008
141views more  TASLP 2008»
15 years 5 months ago
Unsupervised Pattern Discovery in Speech
We present a novel approach to speech processing based on the principle of pattern discovery. Our work represents a departure from traditional models of speech recognition, where t...
A. S. Park, J. R. Glass
156
Voted
ISCI
2007
152views more  ISCI 2007»
15 years 5 months ago
Evaluating digital video recorder systems using analytic hierarchy and analytic network processes
Digital video recorder (DVR) systems are novel security products with significant potential for application in the surveillance market, which, like many other areas of security t...
Che-Wei Chang, Cheng-Ru Wu, Chin-Tsai Lin, Hung-Lu...
TSE
2008
92views more  TSE 2008»
15 years 5 months ago
Evaluating Test Suites and Adequacy Criteria Using Simulation-Based Models of Distributed Systems
Test adequacy criteria provide the engineer with guidance on how to populate test suites. While adequacy criteria have long been a focus of research, existing testing methods do no...
Matthew J. Rutherford, Antonio Carzaniga, Alexande...
153
Voted
JMM2
2007
120views more  JMM2 2007»
15 years 5 months ago
A Rate Estimation Framework for Matching Pursuits Video Coding
— The Bath University Matching Pursuit (BUMP) project aims at developing new matching pursuit (MP) algorithms for still image and video compression. Compared to traditional MP co...
Haoxiang Zhang, Adrian N. Evans, Donald M. Monro