Sciweavers

446 search results - page 87 / 90
» A Study of Dead Data Members in C Applications
Sort
View
ICPR
2010
IEEE
14 years 29 days ago
Detecting Altered Fingerprints
Abstract--The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring t...
Jianjiang Feng, Anil Jain, Arun Ross
NN
2008
Springer
158views Neural Networks» more  NN 2008»
13 years 8 months ago
Improved mapping of information distribution across the cortical surface with the support vector machine
The early visual cortices represent information of several stimulus attributes, such as orientation and color. To understand the coding mechanisms of these attributes in the brain...
Youping Xiao, Ravi Rao, Guillermo A. Cecchi, Ehud ...
IMC
2010
ACM
13 years 6 months ago
Eyeball ASes: from geography to connectivity
This paper presents a new approach to determine the geographical footprint of individual Autonomous Systems that directly provide service to end-users, i.e.,eyeball ASes. The key ...
Amir H. Rasti, Nazanin Magharei, Reza Rejaie, Walt...
VEE
2012
ACM
218views Virtualization» more  VEE 2012»
12 years 4 months ago
Enhancing TCP throughput of highly available virtual machines via speculative communication
Checkpoint-recovery based virtual machine (VM) replication is an attractive technique for accommodating VM installations with high-availability. It provides seamless failover for ...
Balazs Gerofi, Yutaka Ishikawa
HPCA
2008
IEEE
14 years 9 months ago
Supporting highly-decoupled thread-level redundancy for parallel programs
The continued scaling of device dimensions and the operating voltage reduces the critical charge and thus natural noise tolerance level of transistors. As a result, circuits can p...
M. Wasiur Rashid, Michael C. Huang