Sciweavers

2259 search results - page 33 / 452
» Addressing Mode Selection
Sort
View
IJNSEC
2007
95views more  IJNSEC 2007»
13 years 9 months ago
Evaluation of Distributed File Integrity Analyzers in the Presence of Tampering
In this paper, the Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions (CONFIDANT) is evaluated in the presence of tampering. CO...
Adam J. Rocke, Ronald F. DeMara, Simon Foo
TASLP
2008
112views more  TASLP 2008»
13 years 9 months ago
A Study in Efficiency and Modality Usage in Multimodal Form Filling Systems
The usage patterns of speech and visual input modes are investigated as a function of relative input mode efficiency for both desktop and personal digital assistant (PDA) working ...
Manolis Perakakis, Alexandros Potamianos
TIP
2010
132views more  TIP 2010»
13 years 7 months ago
Compress Compound Images in H.264/MPGE-4 AVC by Exploiting Spatial Correlation
—Compound images are a combination of text, graphics and natural image. They present strong anisotropic features, especially on the text and graphics parts. These anisotropic fea...
Cuiling Lan, Guangming Shi, Feng Wu
DFT
1999
IEEE
131views VLSI» more  DFT 1999»
14 years 1 months ago
Optimal Vector Selection for Low Power BIST
In the last decade, researchers have devoted increasing efforts to reduce the average power consumption in VLSI systems during normal operation mode, while power consumption durin...
Fulvio Corno, Matteo Sonza Reorda, Maurizio Rebaud...
IISWC
2006
IEEE
14 years 3 months ago
Performance Characterization of SPEC CPU2006 Integer Benchmarks on x86-64 Architecture
— As x86-64 processors become the CPU of choice for the personal computer market, it becomes increasingly important to understand the performance we can expect by migrating appli...
Dong Ye, Joydeep Ray, Christophe Harle, David R. K...