Sciweavers

188 search results - page 32 / 38
» When Regions Start to Move
Sort
View
118
Voted
EUROSYS
2008
ACM
15 years 11 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
MICRO
2007
IEEE
168views Hardware» more  MICRO 2007»
15 years 8 months ago
Global Multi-Threaded Instruction Scheduling
Recently, the microprocessor industry has moved toward chip multiprocessor (CMP) designs as a means of utilizing the increasing transistor counts in the face of physical and micro...
Guilherme Ottoni, David I. August
CORR
2006
Springer
113views Education» more  CORR 2006»
15 years 1 months ago
A Unified View of TD Algorithms; Introducing Full-Gradient TD and Equi-Gradient Descent TD
This paper addresses the issue of policy evaluation in Markov Decision Processes, using linear function approximation. It provides a unified view of algorithms such as TD(), LSTD()...
Manuel Loth, Philippe Preux
BIOINFORMATICS
2005
93views more  BIOINFORMATICS 2005»
15 years 1 months ago
Donuts, scratches and blanks: robust model-based segmentation of microarray images
Inner holes, artifacts and blank spots are common in microarray images, but current image analysis methods do not pay them enough attention. We propose a new robust model-based me...
Qunhua Li, Chris Fraley, Roger Eugene Bumgarner, K...
119
Voted
MP
2002
176views more  MP 2002»
15 years 1 months ago
UOBYQA: unconstrained optimization by quadratic approximation
UOBYQA is a new algorithm for general unconstrained optimization calculations, that takes account of the curvature of the objective function, F say, by forming quadratic models by ...
M. J. D. Powell