Sciweavers

65 search results - page 12 / 13
» A call to arms
Sort
View
VLSID
2008
IEEE
166views VLSI» more  VLSID 2008»
14 years 7 months ago
Exploring the Processor and ISA Design for Wireless Sensor Network Applications
Power consumption, physical size, and architecture design of sensor node processors have been the focus of sensor network research in the architecture community. What lies at the ...
Shashidhar Mysore, Banit Agrawal, Frederic T. Chon...
ISMAR
2009
IEEE
14 years 1 months ago
A dataset and evaluation methodology for template-based tracking algorithms
Unlike dense stereo, optical flow or multi-view stereo, templatebased tracking lacks benchmark datasets allowing a fair comparison between state-of-the-art algorithms. Until now,...
Sebastian Lieberknecht, Selim Benhimane, Peter Geo...
CCS
2007
ACM
14 years 29 days ago
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction
An alarming trend in malware attacks is that they are armed with stealthy techniques to detect, evade, and subvert malware detection facilities of the victim. On the defensive sid...
Xuxian Jiang, Xinyuan Wang, Dongyan Xu
VEE
2005
ACM
119views Virtualization» more  VEE 2005»
14 years 10 days ago
A programmable microkernel for real-time systems
We present a new software system architecture for the implementation of hard real-time applications. The core of the system is a microkernel whose reactivity (interrupt handling a...
Christoph M. Kirsch, Marco A. A. Sanvido, Thomas A...
ICPP
2003
IEEE
14 years 2 days ago
Data Conversion for Process/Thread Migration and Checkpointing
Process/thread migration and checkpointing schemes support load balancing, load sharing and fault tolerance to improve application performance and system resource usage on worksta...
Hai Jiang, Vipin Chaudhary, John Paul Walters