Sciweavers

11234 search results - page 2177 / 2247
» A Microsurgery Simulation System
Sort
View
ASPLOS
2006
ACM
14 years 4 months ago
Improving software security via runtime instruction-level taint checking
Current taint checking architectures monitor tainted data usage mainly with control transfer instructions. An alarm is raised once the program counter becomes tainted. However, su...
Jingfei Kong, Cliff Changchun Zou, Huiyang Zhou
CASES
2006
ACM
14 years 4 months ago
Code transformation strategies for extensible embedded processors
Embedded application requirements, including high performance, low power consumption and fast time to market, are uncommon in the broader domain of general purpose applications. I...
Paolo Bonzini, Laura Pozzi
CSCW
2006
ACM
14 years 4 months ago
Exploring the effects of group size and display configuration on visual search
Visual search is the subject of countless psychology studies in which people search for target items within a scene. The bulk of this literature focuses on the individual with the...
Clifton Forlines, Chia Shen, Daniel Wigdor, Ravin ...
ETRA
2006
ACM
198views Biometrics» more  ETRA 2006»
14 years 4 months ago
Perceptual attention focus prediction for multiple viewers in case of multimedia perceptual compression with feedback delay
Human eyes have limited perception capabilities. Only 2 degrees of our 180 degree vision field provide the highest quality of perception. Due to this fact the idea of perceptual a...
Oleg Komogortsev, Javed I. Khan
ISLPED
2006
ACM
109views Hardware» more  ISLPED 2006»
14 years 4 months ago
Power reduction of multiple disks using dynamic cache resizing and speed control
This paper presents an energy-conservation method for multiple disks and their cache memory. Our method periodically resizes the cache memory and controls the rotation speeds unde...
Le Cai, Yung-Hsiang Lu
« Prev « First page 2177 / 2247 Last » Next »