Sciweavers

20197 search results - page 3903 / 4040
» Comparing Computational Power
Sort
View
LCTRTS
2009
Springer
14 years 5 months ago
A compiler optimization to reduce soft errors in register files
Register file (RF) is extremely vulnerable to soft errors, and traditional redundancy based schemes to protect the RF are prohibitive not only because RF is often in the timing c...
Jongeun Lee, Aviral Shrivastava
GLOBECOM
2009
IEEE
14 years 5 months ago
Peer-to-Peer Single Hop Distributed Hash Tables
Abstract—Efficiently locating information in large-scale distributed systems is a challenging problem to which Peer-to-Peer (P2P) Distributed Hash Tables (DHTs) can provide a hi...
Luiz Rodolpho Monnerat, Cláudio L. Amorim
HAPTICS
2009
IEEE
14 years 5 months ago
Haptic stiffness identification by veterinarians and novices: A comparison
Palpation is important in both veterinary and medical health professions. It is however difficult to learn, teach and assess. More must be understood about the skills involved in ...
Neil Forrest, Sarah Baillie, Hong Z. Tan
ICASSP
2009
IEEE
14 years 5 months ago
Compressive confocal microscopy
In this paper, a new approach for Confocal Microscopy (CM) based on the framework of compressive sensing is developed. In the proposed approach, a point illumination and a random ...
Peng Ye, José L. Paredes, Gonzalo R. Arce, ...
ICC
2009
IEEE
123views Communications» more  ICC 2009»
14 years 5 months ago
Combining Hidden Markov Models for Improved Anomaly Detection
—In host-based intrusion detection systems (HIDS), anomaly detection involves monitoring for significant deviations from normal system behavior. Hidden Markov Models (HMMs) have...
Wael Khreich, Eric Granger, Robert Sabourin, Ali M...
« Prev « First page 3903 / 4040 Last » Next »