Search For:

Displaying 1-50 out of 481 total
Speculative hardware/software co-designed floating-point multiply-add fusion
Found in: Proceedings of the 19th international conference on Architectural support for programming languages and operating systems (ASPLOS '14)
By David R. Ditzel, Enric Gibert, Grigorios Magklis, Kyriakos Stavrou, Marc Lupon, Raúl Martínez, Sridhar Samudrala
Issue Date:March 2014
pp. 623-638
A Fused Multiply-Add (FMA) instruction is currently available in many general-purpose processors. It increases performance by reducing latency of dependent operations and increases precision by computing the result as an indivisible operation with no inter...
     
Kintense: A robust, accurate, real-time and evolving system for detecting aggressive actions from streaming 3D skeleton data
Found in: 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom)
By Shahriar Nirjon,Chris Greenwood,Carlos Torres,Stefanie Zhou,John A. Stankovic, Hee Jung Yoon, Ho-Kyeong Ra,Can Basaran, Taejoon Park,Sang H. Son
Issue Date:March 2014
pp. 2-10
Kintense is a robust, accurate, real-time, and evolving system for detecting aggressive actions such as hitting, kicking, pushing, and throwing from streaming 3D skeleton joint coordinates obtained from Kinect sensors. Kintense uses a combination of: (1) a...
   
Multi-modal descriptors for multi-class hand pose recognition in human computer interaction systems
Found in: Proceedings of the 15th ACM on International conference on multimodal interaction (ICMI '13)
By Anna Sabaté, Jordi Abella, Coen Antens, Joan Mas, Jordi Gonzàlez, Raúl Alcaide, Sergio Escalera
Issue Date:December 2013
pp. 503-508
Hand pose recognition in advanced Human Computer Interaction systems (HCI) is becoming more feasible thanks to the use of affordable multi-modal RGB-Depth cameras. Depth data generated by these sensors is a very valuable input information, although the rep...
     
Evaluating Mobility Models in Delay Tolerant Network
Found in: 2013 International Conference on IT Convergence and Security (ICITCS)
By Regin Cabacas,In-ho Ra
Issue Date:December 2013
pp. 1-4
Mobility model is an essential factor in evaluating routing protocols designed for Delay Tolerant Networks. The use of inappropriate mobility models for evaluating a routing protocol in DTN can significantly affect its performance and the applicability in ...
   
KinSpace: to provide fall prevention using Kinect
Found in: Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems (SenSys '13)
By John A. Stankovic, Sang H. Son, Shahriar Nirjon, Taejoon Park, Chris Greenwood, Hee Jung Yoon, Ho-Kyeong Ra
Issue Date:November 2013
pp. 1-2
Falls are a significant problem for the elderly living independently in the home. Many falls occur due to household objects left in open spaces. We present KinSpace, a system that uses real-time depth data and human-in-the-loop feedback to adjust its under...
     
Kintense: a robust, accurate, real-time and evolving system for detecting aggressive actions from streaming 3D skeleton data
Found in: Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems (SenSys '13)
By Can Basaran, Carlos Torres, Hee Jung Yoon, Ho-Kyeong Ra, John A. Stankovic, Shahriar Nirjon, Stefanie Zhou, Chris Greenwood, Sang H. Son, Taejoon Park
Issue Date:November 2013
pp. 1-2
Kintense is a robust, accurate, real-time, and evolving system for detecting aggressive actions such as hitting, kicking, pushing, and throwing from streaming 3D skeleton joint coordinates obtained from Kinect sensors. Kintense uses a combination of: (1) a...
     
Enhancing the shopping experience through RFID in an actual retail store
Found in: Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication (UbiComp '13 Adjunct)
By Anna Carreras, Joan Melià-Seguí, Marc Morenza-Cinos, Raúl Parada, Rafael Pous, Ramir De Porrata-Doria, Zeinab Liaghat
Issue Date:September 2013
pp. 1029-1036
Radio Frequency Identification (RFID) offers an extraordinary opportunity to enhance the shopping experience of customers in a retail store. There are two types of possible enhancements: increasing the efficiency of traditional processes, or offering new u...
     
Study of a monopulse system with RFID antennas for applications oriented to retail industry
Found in: Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication (UbiComp '13 Adjunct)
By Anna Carreras, Joan Melià-Seguí, Raúl Parada, Rafael Pous
Issue Date:September 2013
pp. 279-282
Radio Frequency Identification (RFID) allows the identification and location of items using passive electronic labels. However, current RFID techniques do not locate objects precisely. The monopulse system allows to locate objects with higher accuracy usin...
     
Digital libraries for the preservation of research methods and associated artifacts
Found in: Proceedings of the 1st International Workshop on Digital Preservation of Research Methods and Artefacts (DPRMA '13)
By Cezary Mazurek, Kevin Page, Oscar Corcho, Piotr Hotubowicz, Raúl Palma, Sara Pérez
Issue Date:July 2013
pp. 8-15
New digital artifacts are emerging in data-intensive science. For example, scientific workflows are executable descriptions of scientific procedures that define the sequence of computational steps in an automated data analysis, supporting reproducible rese...
     
A novel component identification approach using evolutionary programming
Found in: Proceeding of the fifteenth annual conference companion on Genetic and evolutionary computation conference companion (GECCO '13 Companion)
By Aurora Ramírez, José Raúl Romero, Sebastián Ventura
Issue Date:July 2013
pp. 209-210
Component identification is a critical phase in software architecture analysis to prevent later errors and control the project time and budget. Obtaining the most appropriate architecture according to predetermined design criteria can be treated as an opti...
     
Construction and applicability of military ontology for semantic data processing
Found in: Proceedings of the 3rd International Conference on Web Intelligence, Mining and Semantics (WIMS '13)
By Donghee Yoo, Minyoung Ra, Sungchun No
Issue Date:June 2013
pp. 1-7
Recently, ontology has been utilized as a crucial element in knowledge management and knowledge representation. In the military area, the importance of ontology is also increasing. If military ontology is provided, machines will be able to understand and a...
     
A Study on Visitors Tracking Method Using Wireless Communication
Found in: 2013 International Conference on Information Science and Applications (ICISA)
By Shin-Hyeong Choi,Sun-Yeob Kim,Yoo-Chan Ra
Issue Date:June 2013
pp. 1-3
Wireless sensor networks are rapidly growing. Wireless sensor networks are composed of a large number of radio frequency equipped sensor devices that autonomously form networks through which sensor data is transported. These sensor devices are used in vari...
   
Development Common Data Model for Adverse Drug Signal Detection Based on Multi-Center EMR Systems
Found in: 2013 International Conference on Information Science and Applications (ICISA)
By Mi Jung Rho,Si Ra Kim,Seung Ho Park,Kwang Soo Jang,Bum Joon Park,In Young Choi
Issue Date:June 2013
pp. 1-7
The drug safety monitoring based on EMR system is able to collect more objective pharmacovigilance data and analyze adverse drug reaction (ADR) earlier than spontaneous ADR reporting. This study developed the Korea ADR common data model (K-ADR CDM) for ear...
   
Performance Analysis of Ad Hoc Routing Protocols Based on Selective Forwarding Node Algorithms
Found in: 2013 International Conference on Information Science and Applications (ICISA)
By Ahyoung Lee,Charlemagne G. Lavina,Jonathan Caballero,Ilkyeun Ra
Issue Date:June 2013
pp. 1-4
Network resources are essential in resource critical environments as ad hoc wireless networks (AWNs) due to their dynamic topology and broadcasting of packets over the wireless medium without a central controller. In order to perform a routing algorithm wi...
   
The impact of user-browser interaction on web performance
Found in: Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC '13)
By Ana Pont, José A. Gil, Julio Sahuquillo, Raúl Peña-Ortiz
Issue Date:March 2013
pp. 695-702
The user interaction with the current web contents is a major concern when defining web workloads in order to precisely estimate system performance. However, the intrinsic difficulty to represent this behavior in a workload model leads many research works ...
     
Preprocessing of informal mathematical discourse in context ofcontrolled natural language
Found in: Proceedings of the 21st ACM international conference on Information and knowledge management (CIKM '12)
By Juan Francisco Díaz Frías, Raúl Ernesto Gutiérrez de Piñerez Reyes
Issue Date:October 2012
pp. 1632-1636
Informal Mathematical Discourse (IMD) is characterized by the mixture of natural language and symbolic expressions in the context of textbooks, publications in mathematics and mathematical proof. We focused the IMD processing at the low level of discourse....
     
Using Constraint Programming to Manage Configurations in Self-Adaptive Systems
Found in: Computer
By Pete Sawyer,Raúl Mazo,Daniel Diaz,Camille Salinesi,Danny Hughes
Issue Date:October 2012
pp. 56-63
Combining goal-modeling techniques with constraint programming provides the means to identify the variants best suited to the environmental contexts that a self-adaptive software system might encounter at runtime. The Web extra at http://youtu.be/q-oheenSq...
 
Management, communications and security policy in mobile database systems
Found in: Proceedings of the Fifth Balkan Conference in Informatics (BCI '12)
By Betim Çiço, Majlinda Fetaji, Vigan Raça
Issue Date:September 2012
pp. 118-123
This paper presents a typical "Net-Centric" system which is based on three main scenarios as the concept of management of data, communication and security policies, all of these based on mobile system. The paper is projected to relate these elements, prese...
     
Improving energy efficiency of personal sensing applications with heterogeneous multi-processors
Found in: Proceedings of the 2012 ACM Conference on Ubiquitous Computing (UbiComp '12)
By Aman Kansal, Bodhi Priyantha, Jie Liu, Moo-Ryong Ra
Issue Date:September 2012
pp. 1-10
The availability of multiple sensors on mobile devices offers a significant new capability to enable rich user and context aware applications. Many of these applications run in the background to continuously sense user context. However, running these appli...
     
Anonymizing set-valued data by nonreciprocal recoding
Found in: Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD '12)
By Chedy Raïssi, Jaideep Vaidya, Kian-Lee Tan, Mingqiang Xue, Panagiotis Karras
Issue Date:August 2012
pp. 1050-1058
Today there is a strong interest in publishing set-valued data in a privacy-preserving manner. Such data associate individuals to sets of values (e.g., preferences, shopping items, symptoms, query logs). In addition, an individual can be associated with a ...
     
Demo: Medusa: a programming framework for crowd-sensing applications
Found in: Proceedings of the 10th international conference on Mobile systems, applications, and services (MobiSys '12)
By Bin Liu, Moo-Ryong Ra, Ramesh Govindan, Tom F. La Porta
Issue Date:June 2012
pp. 481-482
The ubiquity of smartphones and their on-board sensing capabilities motivates crowd-sensing, a capability that harnesses the power of crowds to collect sensor data from a large number of mobile phone users. Unlike previous work on wireless sensing, crowd-s...
     
Medusa: a programming framework for crowd-sensing applications
Found in: Proceedings of the 10th international conference on Mobile systems, applications, and services (MobiSys '12)
By Bin Liu, Moo-Ryong Ra, Ramesh Govindan, Tom F. La Porta
Issue Date:June 2012
pp. 337-350
The ubiquity of smartphones and their on-board sensing capabilities motivates crowd-sensing, a capability that harnesses the power of crowds to collect sensor data from a large number of mobile phone users. Unlike previous work on wireless sensing, crowd-s...
     
A quality aware service-oriented web warehouse platform
Found in: Proceedings of the 2012 Joint EDBT/ICDT Workshops (EDBT-ICDT '12)
By Adriana Marotta, Laura González, Raúl Ruggia
Issue Date:March 2012
pp. 29-32
In order to be a useful tool, a Web Warehouse (WW) should take into account the quality of the data it manages and the quality of the services that provide the source data. It should also have enough flexibility to endure the high volatility of web sources...
     
Odessa: enabling interactive perception applications on mobile devices
Found in: Proceedings of the 9th international conference on Mobile systems, applications, and services (MobiSys '11)
By Anmol Sheth, David Wetherall, Lily Mummert, Moo-Ryong Ra, Padmanabhan Pillai, Ramesh Govindan
Issue Date:June 2011
pp. 43-56
Resource constrained mobile devices need to leverage computation on nearby servers to run responsive applications that recognize objects, people, or gestures from real-time video. The two key questions that impact performance are what computation to offloa...
     
Adaptive DDoS Detector Design Using Fast Entropy Computation Method
Found in: Innovative Mobile and Internet Services in Ubiquitous Computing, International Conference on
By Giseop No, Ilkyeun Ra
Issue Date:July 2011
pp. 86-93
Recently, the threat of DDoS (Distributed Denial-of-Service) attacks is growing continuously and acquiring attacking tools via Internet is getting easy. One of the researches introduced a fast method to detect attacks using modified information entropy (so...
 
A Framework for Automated Performance Tuning and Code Verification on GPU Computing Platforms
Found in: Parallel and Distributed Processing Workshops and PhD Forum, 2011 IEEE International Symposium on
By Allison S. Gehrke,Ilkyeun Ra,Daniel A. Connors
Issue Date:May 2011
pp. 2113-2116
Emerging multi-core processor designs create a computing paradigm capable of advancing numerous scientific areas, including medicine, data mining, biology, physics, and earth sciences. However, the trends in multi-core hardware technology have advanced far...
 
Modeling Ion Channel Kinetics with HPC
Found in: High Performance Computing and Communications, 10th IEEE International Conference on
By Allison Gehrke, Katherine Rennie, Timothy Benke, Daniel A. Connors, Ilkyeun Ra
Issue Date:September 2010
pp. 562-567
Performance improvements for computational sciences such as biology, physics, and chemistry are critically dependent on advances in multicore and manycore hardware. However, these emerging systems require substantial investment in software development time...
 
Adaptive-gossiping for an energy-aware routing protocol in wireless sensor networks
Found in: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference (IWCMC '10)
By Ahyoung Lee, Ilkyeun Ra
Issue Date:June 2010
pp. 1131-1135
Energy efficiency is the essential consideration in advances of wireless sensor networks (WSNs) usefully designed for low data rate, low power consumption, and low-cost networking. Mindful of the above constraints, selecting an appropriate routing protocol...
     
Efficient K-Best Detection Technique for MIMO-OFDM-Based Mobile Multimedia Systems
Found in: Convergence Information Technology, International Conference on
By Myung-Sun Baek, So-Ra Park, Hyoung-Kyu Song, Yong-Tae Lee
Issue Date:November 2009
pp. 847-851
MIMO-OFDM schemes with SDM have been studied for high speed multimedia systems. However, since accurate received MIMO signal detection is very hard, MIMO-OFDM systems have not reached the available capacities. For high detection performance and low complex...
 
A Study on the New BSC Algorithm and Design for Network Security
Found in: New Trends in Information and Service Science, International Conference on
By Hyoung-Keun Park, Sun-Youb Kim, Yu-Chan Ra, Seung-Woo Lee
Issue Date:July 2009
pp. 37-41
New BSC cryptographic algorithm is suitable network environment and wire/wireless communication network, on implement easy, security rate preservation, scalable and reconfigurable. Though proposed algorithm strengthens security vulnerability of TCP/IP prot...
 
A Study on Control Method to Reduce Collisions and Interferences between Multiple RFID Readers and RFID Tag
Found in: New Trends in Information and Service Science, International Conference on
By Sun-Youb Kim, Hyoung-Keun Park, Jung-Ki Lee, Yu-Chan Ra, Seung-Woo Lee
Issue Date:July 2009
pp. 339-343
In relation to the method of controlling multiple RFID reader where multiple RFID readers recognize the RFID tag to reduce collisions and interferences of frequency between RFID readers, the multiple RFID reader control method proposed in this study is com...
 
Improving the System-on-a-Chip Performance for Mobile Systems by Using Efficient Bus Interface
Found in: Communications and Mobile Computing, International Conference on
By Na Ra Yang, Gilsang Yoon, Jeonghwan Lee, Intae Hwang, Cheol Hong Kim, Sung Woo Chung, Jong Myon Kim
Issue Date:January 2009
pp. 606-608
Minimizing the communication delay is one of the most important design considerations in System-on-a-Chip (SoC) design for mobile systems. In this paper, we present a bus interface design technique, called Efficient Bus Interface (EBI), to reduce the commu...
 
A Scenario-based Directional Communication Performance in Wireless Ad hoc Networks
Found in: Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on
By Murad Khalid, In-ho Ra, Young-hoon Joo, Ravi Sankar
Issue Date:December 2008
pp. 266-271
Ad hoc wireless networks operate without any infrastructure where a node can be a source and a router at the same time. This indispensably requires high throughput and low delay performance throughout the wireless network coverage span, particularly under ...
 
Loop Detection for Energy-Aware High Performance Embedded Processors
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Na Ra Yang, Gilsang Yoon, Jeonghwan Lee, Intae Hwang, Cheol Hong Kim, Jong Myon Kim
Issue Date:December 2008
pp. 1578-1583
The energy consumed in instruction fetching accounts for a significant portion of total processor energy consumption. Energy consumption as well as performance should be considered when designing high performance embedded processors. In this paper, we pres...
 
Design and Evaluation of a Network Forensic Logging System
Found in: Convergence Information Technology, International Conference on
By Tae-Kyou Park, Ilkyeun Ra
Issue Date:November 2008
pp. 1125-1130
This paper describes a forensic logging system that collects fine-grained evidence from target servers and networks. For the logging system, we developed a TCSEC-B1 level secure operating system and a dedicated network processor that collects network traff...
 
A Study on Performance Evaluation of the Asymmetric Turbo Codes
Found in: Hybrid Information Technology, International Conference on
By Byoung-Sup Shim, Seok-Jun Choi, Hyoung-Keun Park, Sun-Youb Kim, Yu-Chan Ra
Issue Date:August 2008
pp. 667-671
It is well known the fact that the turbo codes has better performance as the number of iterations and the interleaver size increase in an AWGN channel environment. However, if the number of iterations and the interleaver size are increased, it is required ...
 
Virtual Laboratory for Development and Execution of Biomedical Collaborative Applications
Found in: Computer-Based Medical Systems, IEEE Symposium on
By Marian Bubak, Tomasz Gubala, Maciej Malawski, Bartosz Balis, Wlodzimierz Funika, Tomasz Bartynski, Eryk Ciepiela, Daniel Harezlak, Marek Kasztelnik, Joanna Kocot, Dariusz Krol, Piotr Nowakowski, Michal Pelczar, Jakub Wach, Matthias Assel, Alfredo Tirado-Ra
Issue Date:June 2008
pp. 373-378
The ViroLab Virtual Laboratory is a collaborative platform for scientists representing multiple fields of expertise while working together on common scientific goals. This environment makes it possible to combine efforts of computer scientists, virology an...
 
New BESA Algorithm Development and Design for Network Security in Multimedia Communication
Found in: Information Science and Security, International Conference on
By Hyoung-Keun Park, Sun-Youb Kim, Yu-Chan Ra, Sang-Keon Lee
Issue Date:January 2008
pp. 78-83
New BESA cryptographic algorithm is suitable network environment and wire/wireless communication network, on implement easy, security rate preservation, scalable and reconfigurable. Though proposed algorithm strengthens security vulnerability of TCP/IP pro...
 
Enhanced Renormalization Algorithm in MQ-Coder of JPEG2000
Found in: Information Technology Convergence, International Symposium on
By Byungjun Min, Sook Yoon, Jungjin Ra, Dong Sun Park
Issue Date:November 2007
pp. 213-216
JPEG2000 is the latest still-image coding standard. It was designed to overcome the limitation of the original JPEG standard and provide high quality images at low bit rates. The JPEG2000 algorithm is fundamentally based on the Discrete Wavelet Transform (...
 
Image enhancement in multi-resolution multi-sensor fusion
Found in: Advanced Video and Signal Based Surveillance, IEEE Conference on
By J. H. Jang, Y. S. Kim, J. B. Ra
Issue Date:September 2007
pp. 289-294
In multi-sensor image fusion, multi-resolution approaches became popular because they can preserve detailed information well. Among them, the gradient-based multi-resolution (GBMR) algorithm is known to effectively reduce ringing artifacts near edges compa...
 
Designing and Developing Medical Device Software Systems Using the Model Driven Architecture (MDA)
Found in: Joint Workshop on High Confidence Medical Devices, Software, and Systems and Medical Device Plug-and-Play Interoperability
By Amen Ra Mashariki, LeeRoy Bronner, Peter Kazanzides
Issue Date:June 2007
pp. 156-159
On the surface, Model-Driven Architecture(MDA) appears to be a fundamentally new paradigm compared to traditional software development. Upon closer examination, however, MDA mainly shifts the focus of iterative development to a higher level of abstraction....
 
SPECS: smart partial enciphering service for accessing encrypted files with efficient and transparent
Found in: Proceedings of the 2nd ACM symposium on Information, computer and communications security (ASIACCS '07)
By Ilkyeun Ra, Tae-Kyou Park
Issue Date:March 2007
pp. 377-379
This paper presents an efficient file enciphering service for a UNIX-like operating system. It allows OSs to encipher or/and decipher automatically only a portion of being accessed file by applications. Its approach shows that users can access encrypted fi...
     
Trajectory Retrieval Using Similarity Measure According to Link Type between Motion Verbs
Found in: Asia International Conference on Modelling & Simulation
By Miyoung Cho, Chang Choi, Sicheon You, Minchang Lee, Jonghei Ra, Pankoo Kim
Issue Date:March 2007
pp. 358-362
Our main objective is to compare distance measurement for the motion verbs from the cognitive point of view and that of computable point of view. We use motion verbs to represent moving of objects as high-level features from the cognitive point of view. In...
 
Generation of shorter sequences for high resolution error diagnosis using sequential SAT
Found in: Proceedings of the 2006 conference on Asia South Pacific design automation (ASP-DAC '06)
By John Moondanos, Kwang-Ting Cheng, Sung-Jui (Song-Ra) Pan, Ziyad Hanna
Issue Date:January 2006
pp. 25-29
Commonly used pattern sources in simulation-based verification include random, guided random, or design verification patterns. Although these patterns may help bring the design to those hard-to-reach states for activating the errors and for propagating the...
     
A Fast Full Search Equivalent Encoding Algorithm for Image Vector Quantization Based on the WHT and a LUT
Found in: System-on-Chip for Real-Time Applications, International Workshop on
By Chul-hyung Ryu, Sung-woong Ra
Issue Date:July 2005
pp. 405-409
The application of vector quantization has been constrained to a great deal since its encoding process is very heavy. This paper presents a fast encoding algorithm called the double feature-ordered partial codebook search (DFPS) algorithm for image vector ...
 
Scalable enterprise level workflow and infrastructure management in a grid computing environment
Found in: Cluster Computing and the Grid, IEEE International Symposium on
By Keyur Gor, Dheepak Ra, Shakeb Ali, Lech Alves, Neel Arurkar, Ira Gupta, Anirban Chakrabarti, Amit Sharma, Shubhashis Sengupta
Issue Date:May 2005
pp. 661-667
A grid is described as a distributed network which comprises of heterogeneous and non-dedicated elements. The heterogeneity of a grid is not only defined in terms of computing elements and operating systems but also in terms of implementation of policies, ...
 
ADViCE over Grid Services: Initial Deployment
Found in: Challenges of Large Applications in Distributed Environments, International Workshop on
By Yoonhee Kim, Ilkyeun Ra, Sung-Yong Park, Byounguk Kim, Salim Hariri, Bithika Khargharia, Sangsan Lee
Issue Date:June 2003
pp. 27
The complexity of computational grid applications and their environments has been increased due to the heterogeneity of resources; complexity, continuous changes of the applications as well as the resources states, and the large number of resources involve...
 
Performance Optimization by Wire and Buffer Sizing under the Transmission Line Model
Found in: Computer Design, International Conference on
By Tai-Chen Chen, Yao-Wen Chang, Song-Ra Pan
Issue Date:September 2001
pp. 0192
Abstract: As the operating frequency increases to Giga Hertz and the rise time of a signal is less than or comparable to the time-of-flight delay of a line, it is necessary to consider the transmission line behavior for delay computation. We present in thi...
 
A hybrid GMM/SVM approach to speaker identification
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By S. Fine, J. Navratil, R.A. Gopinath
Issue Date:May 2001
pp. 417-420
Proposes a classification scheme that incorporates statistical models and support vector machines. A hybrid system which appropriately combines the advantages of both the generative and discriminant model paradigms is described and experimentally evaluated...
 
An Adaptive Communication System for Heterogeneous Network Computing
Found in: Parallel and Distributed Processing Symposium, International
By IIkeyun Ra, Salim Hariri, Cauligi Raghavendra
Issue Date:April 2001
pp. 20088a
<p>In this paper, we present an architecture of an Adaptive Communication System (ACS) that provides applications with programmable communication, control, and management services that can be adopted dynamically to maximize application performance at...
 
 1  2 Next >>