Sciweavers

107 search results - page 16 / 22
» An Experimental Evaluation of Inspection and Testing for Det...
Sort
View
EICS
2009
ACM
14 years 2 months ago
Input evaluation of an eye-gaze-guided interface: Kalman filter vs. velocity threshold eye movement identification
This paper evaluates the input performance capabilities of Velocity Threshold (I-VT) and Kalman Filter (I-KF) eye movement detection models when employed for eye-gaze-guided inter...
Do Hyong Koh, Sandeep A. Munikrishne Gowda, Oleg V...
ISCA
2007
IEEE
120views Hardware» more  ISCA 2007»
14 years 1 months ago
Examining ACE analysis reliability estimates using fault-injection
ACE analysis is a technique to provide an early reliability estimate for microprocessors. ACE analysis couples data from performance models with low level design details to identi...
Nicholas J. Wang, Aqeel Mahesri, Sanjay J. Patel
CASES
2006
ACM
13 years 11 months ago
Cost-efficient soft error protection for embedded microprocessors
Device scaling trends dramatically increase the susceptibility of microprocessors to soft errors. Further, mounting demand for embedded microprocessors in a wide array of safety c...
Jason A. Blome, Shantanu Gupta, Shuguang Feng, Sco...
ACMACE
2010
ACM
13 years 2 months ago
Exploiting MMORPG log data toward efficient RMT player detection
To detect players who are engaged in real-money trading (RMT) in massively multi-player online role-playing games (MMORPGs), behavior of players was analyzed using log data of a c...
Hiroshi Itsuki, Asuka Takeuchi, Atsushi Fujita, Hi...
IH
2004
Springer
14 years 1 months ago
Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes
In this paper, we introduce a new feature-based steganalytic method for JPEG images and use it as a benchmark for comparing JPEG steganographic algorithms and evaluating their embe...
Jessica J. Fridrich