Sciweavers

175 search results - page 12 / 35
» Case Provenance: The Value of Remembering Case Sources
Sort
View
ISCA
2003
IEEE
144views Hardware» more  ISCA 2003»
14 years 1 months ago
Half-Price Architecture
Current-generation microprocessors are designed to process instructions with one and two source operands at equal cost. Handling two source operands requires multiple ports for ea...
Ilhyun Kim, Mikko H. Lipasti
BIS
2010
197views Business» more  BIS 2010»
13 years 5 months ago
Ubiquitous Microblogging: A Flow-Based Front-End for Information Logistics
The success of information supply strongly depends on successful user adoption. This especially is the case for the integration of non-human information sources deriving from ubiqu...
Martin Böhringer, Martin Gaedke
CISS
2007
IEEE
14 years 2 months ago
On Capacity of Automatic Target Recognition Systems Under the Constraint of PCA-Encoding
Limiting capabilities of practical recognition systems are determined by a variety of factors that include source encoding techniques, quality of images, complexity of underlying ...
Xiaohan Chen, Natalia A. Schmid
EUROSEC
2009
ACM
14 years 2 months ago
Deep packet anonymization
Network traces of Internet attacks are among the most valuable resources for network analysts and security researchers. However, organizations and researchers are usually reluctan...
Michalis Foukarakis, Demetres Antoniades, Michalis...
ICASSP
2009
IEEE
14 years 2 months ago
DOA estimation of quasi-stationary signals via Khatri-Rao subspace
This paper addresses the problem of direction-of-arrival (DOA) estimation of quasi-stationary signals, which finds applications in array processing of speech and audio. By studyi...
Wing-Kin Ma, Tsung-Han Hsieh, Chong-Yung Chi