Sciweavers

1683 search results - page 202 / 337
» A Needed Narrowing Strategy
Sort
View
DATE
2009
IEEE
138views Hardware» more  DATE 2009»
15 years 11 months ago
Cache aware compression for processor debug support
—During post-silicon processor debugging, we need to frequently capture and dump out the internal state of the processor. Since internal state constitutes all memory elements, th...
Anant Vishnoi, Preeti Ranjan Panda, M. Balakrishna...
147
Voted
ICASSP
2009
IEEE
15 years 11 months ago
Voice convergin: Speaker de-identification by voice transformation
Speaker identification might be a suitable answer to prevent unauthorized access to personal data. However we also need to provide solutions to secure transmission of spoken infor...
Qin Jin, Arthur R. Toth, Tanja Schultz, Alan W. Bl...
ICC
2009
IEEE
168views Communications» more  ICC 2009»
15 years 11 months ago
Routing-Aware Channel Selection in Multi-Radio Mesh Networks
— Efficient channel selection is essential in 802.11 mesh deployments, for minimizing contention and interference among co-channel devices and thereby supporting a plurality of ...
George Athanasiou, Ioannis Broustis, Thanasis Kora...
ICDAR
2009
IEEE
15 years 11 months ago
Document Image Retrieval with Local Feature Sequences
In recent years, many document image retrieval algorithms have been proposed. However, most of the current approaches either need good quality images or depend on the page layout ...
Jilin Li, Zhi-Gang Fan, Yadong Wu, Ning Le
SP
2009
IEEE
123views Security Privacy» more  SP 2009»
15 years 11 months ago
DSybil: Optimal Sybil-Resistance for Recommendation Systems
Recommendation systems can be attacked in various ways, and the ultimate attack form is reached with a sybil attack, where the attacker creates a potentially unlimited number of s...
Haifeng Yu, Chenwei Shi, Michael Kaminsky, Phillip...