Sciweavers

1663 search results - page 262 / 333
» Computer Security in the Real World
Sort
View
ISPA
2004
Springer
15 years 9 months ago
VIOLIN: Virtual Internetworking on Overlay Infrastructure
We propose a novel alternative to application-level overlays called VIOLIN, or Virtual Internetworking on OverLay INfrastructure. Inspired by recent advances in virtual machines, ...
Xuxian Jiang, Dongyan Xu
INFOVIS
2003
IEEE
15 years 9 months ago
EdgeLens: An Interactive Method for Managing Edge Congestion in Graphs
An increasing number of tasks require people to explore, navigate and search extremely complex data sets visualized as graphs. Examples include electrical and telecommunication ne...
Nelson Wong, M. Sheelagh T. Carpendale, Saul Green...
150
Voted
WMCSA
2003
IEEE
15 years 9 months ago
Pervasive Information Acquisition for Mobile AR-Navigation Systems
Today car-navigation systems are increasingly penetrating the automotive market. However, the need for location-based information systems is no longer limited to cars. Mobile outd...
Wolfgang Narzt, Gustav Pomberger, Alois Ferscha, D...
FPL
2009
Springer
161views Hardware» more  FPL 2009»
15 years 8 months ago
A multi-FPGA architecture for stochastic Restricted Boltzmann Machines
Although there are many neural network FPGA architectures, there is no framework for designing large, high-performance neural networks suitable for the real world. In this paper, ...
Daniel L. Ly, Paul Chow
PSIVT
2009
Springer
211views Multimedia» more  PSIVT 2009»
15 years 8 months ago
Inclusion of a Second-Order Prior into Semi-Global Matching
Today’s stereo vision algorithms and computing technology allow real-time 3D data analysis, for example for driver assistance systems. A recently developed Semi-Global Matching (...
Simon Hermann, Reinhard Klette, Eduardo Destefanis