Sciweavers

850 search results - page 167 / 170
» Constraint propagation on quadratic constraints
Sort
View
CASES
2004
ACM
14 years 27 days ago
High-level power analysis for on-chip networks
As on-chip networks become prevalent in multiprocessor systemson-a-chip and multi-core processors, they will be an integral part of the design flow of such systems. With power in...
Noel Eisley, Li-Shiuan Peh
INFOCOM
2003
IEEE
14 years 22 days ago
Integrity for Virtual Private Routed Networks
Abstract— The term Virtual Private Network (VPN) encompasses a wide array of diverse technologies and network architectures. All VPNs should provide users with the isolation and ...
Randy Bush, Timothy Griffin
SSDBM
2003
IEEE
196views Database» more  SSDBM 2003»
14 years 22 days ago
Stream Window Join: Tracking Moving Objects in Sensor-Network Databases
The widespread use of sensor networks presents revolutionary opportunities for life and environmental science applications. Many of these applications involve continuous queries t...
Moustafa A. Hammad, Walid G. Aref, Ahmed K. Elmaga...
WACV
2002
IEEE
14 years 11 days ago
Active Facial Tracking for Fatigue Detection
The vision-based driver fatigue detection is one of the most prospective commercial applications of facial expression recognition technology. The facial feature tracking is the pr...
Haisong Gu, Qiang Ji, Zhiwei Zhu
SIGMOD
2010
ACM
211views Database» more  SIGMOD 2010»
14 years 8 days ago
ERACER: a database approach for statistical inference and data cleaning
Real-world databases often contain syntactic and semantic errors, in spite of integrity constraints and other safety measures incorporated into modern DBMSs. We present ERACER, an...
Chris Mayfield, Jennifer Neville, Sunil Prabhakar