Sciweavers

18374 search results - page 3575 / 3675
» Applications for data hiding
Sort
View
AIPR
2000
IEEE
14 years 1 months ago
Autonomous Video Registration Using Sensor Model Parameter Adjustments
Recently, airborne video surveillance platforms have gained greater acceptance for use in a variety of DoD missions due to their utility, affordability and autonomy. While a varie...
Richard W. Cannata, Steven G. Blask, John A. Van W...
HPCA
2000
IEEE
14 years 1 months ago
Impact of Chip-Level Integration on Performance of OLTP Workloads
With increasing chip densities, future microprocessor designs have the opportunity to integrate many of the traditional systemlevel modules onto the same chip as the processor. So...
Luiz André Barroso, Kourosh Gharachorloo, A...
ICDE
2000
IEEE
89views Database» more  ICDE 2000»
14 years 1 months ago
Managing Escalation of Collaboration Processes in Crisis Mitigation Situations
Processes for crisis mitigation must permit coordination flexibility and dynamic change to empower crisis mitigation coordinators and experts to deal with the unexpected situatio...
Dimitrios Georgakopoulos, Hans Schuster, Donald Ba...
INFOCOM
2000
IEEE
14 years 1 months ago
Freeze-TCP: A True End-to-End TCP Enhancement Mechanism for Mobile Environments
Abstract— Optimizing TCP (Transport Layer) for mobility has been researched extensively. We present a brief summary of existing results which indicates that most schemes require ...
Tom Goff, James Moronski, Dhananjay S. Phatak, Vip...
IPPS
2000
IEEE
14 years 1 months ago
Three Dimensional VLSI-Scale Interconnects
As processor speeds rapidly approach the Giga-Hertz regime, the disparity between process time and memory access time plays an increasing role in the overall limitation of processo...
Dennis W. Prather
« Prev « First page 3575 / 3675 Last » Next »