Sciweavers

368 search results - page 67 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
ICCD
2005
IEEE
119views Hardware» more  ICCD 2005»
14 years 4 months ago
Deployment of Better Than Worst-Case Design: Solutions and Needs
The advent of nanometer feature sizes in silicon fabrication has triggered a number of new design challenges for computer designers. These challenges include design complexity and...
Todd M. Austin, Valeria Bertacco
ICSOC
2007
Springer
14 years 1 months ago
Dynamic Service Provisioning Using GRIA SLAs
Service Level Agreements (SLA) include quality of service (QoS) constraints and bounds that have to be honoured by the service provider. To maximise the Service Provider revenue wh...
Mike J. Boniface, Stephen C. Phillips, Alfonso S&a...
RTSS
2005
IEEE
14 years 1 months ago
Enhancing the Robustness of Distributed Real-Time Middleware via End-to-End Utilization Control
A key challenge for distributed real-time and embedded (DRE) middleware is maintaining both system reliability and desired real-time performance in unpredictable environments wher...
Xiaorui Wang, Chenyang Lu, Xenofon D. Koutsoukos
EUROIMSA
2006
141views Multimedia» more  EUROIMSA 2006»
13 years 8 months ago
Effective Organization and Visualization of Web Search Results
While searching the web, the user is often confronted by a great number of results, generally displayed in a list which is sorted according to the relevance of the results. Facing...
Nicolas Bonnel, Vincent Lemaire, Alexandre Cotarma...
TNN
2008
105views more  TNN 2008»
13 years 7 months ago
Generalized Linear Discriminant Analysis: A Unified Framework and Efficient Model Selection
Abstract--High-dimensional data are common in many domains, and dimensionality reduction is the key to cope with the curse-of-dimensionality. Linear discriminant analysis (LDA) is ...
Shuiwang Ji, Jieping Ye