Sciweavers

9210 search results - page 1772 / 1842
» Analyzing Real-Time Systems
Sort
View
ACCV
2006
Springer
14 years 2 months ago
A Multiscale Co-linearity Statistic Based Approach to Robust Background Modeling
Background subtraction is an essential task in several static camera based computer vision systems. Background modeling is often challenged by spatio-temporal changes occurring due...
Prithwijit Guha, Dibyendu Palai, K. S. Venkatesh, ...
DAC
2006
ACM
14 years 2 months ago
Signature-based workload estimation for mobile 3D graphics
Until recently, most 3D graphics applications had been regarded as too computationally intensive for devices other than desktop computers and gaming consoles. This notion is rapid...
Bren Mochocki, Kanishka Lahiri, Srihari Cadambi, X...
DOCENG
2006
ACM
14 years 2 months ago
Content based SMS spam filtering
In the recent years, we have witnessed a dramatic increment in the volume of spam email. Other related forms of spam are increasingly revealing as a problem of importance, special...
José María Gómez Hidalgo, Gui...
ISLPED
2006
ACM
145views Hardware» more  ISLPED 2006»
14 years 2 months ago
An optimal analytical solution for processor speed control with thermal constraints
As semiconductor manufacturing technology scales to smaller device sizes, the power consumption of clocked digital ICs begins to increase. Dynamic voltage and frequency scaling (D...
Ravishankar Rao, Sarma B. K. Vrudhula, Chaitali Ch...
ISSTA
2006
ACM
14 years 2 months ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...
« Prev « First page 1772 / 1842 Last » Next »