Sciweavers

1734 search results - page 104 / 347
» Design Patterns for Reconfigurable Computing
Sort
View
129
Voted
GROUP
2003
ACM
15 years 7 months ago
Concepts for usable patterns of groupware applications
Patterns, which are based on in-depth practical experience, can be instructing for the design of groupware applications as sociotechnical systems. On the basis of a summary of the...
Thomas Herrmann, Marcel Hoffmann, Isa Jahnke, Andr...
ICPR
2004
IEEE
16 years 3 months ago
A New Optimised De Bruijn Coding Strategy for Structured Light Patterns
Coded structured light is an optical technique based on active stereovision that obtains the shape of objects. Oneshot techniques are based on projecting a unique light pattern wi...
Joaquim Salvi, Jordi Pagès, Josep Forest
ICPR
2008
IEEE
15 years 8 months ago
Establishing point correspondence using multidirectional binary pattern for face recognition
This paper presents a new Multidirectional Binary Pattern (MBP) for face recognition. Different from most Local Binary Pattern (LBP) related approaches which cluster LBP occurrenc...
Sanqiang Zhao, Yongsheng Gao
IPPS
1995
IEEE
15 years 6 months ago
Characterizing parallel file-access patterns on a large-scale multiprocessor
High-performance parallel file systems are needed to satisfy tremendous I/O requirements of parallel scientific applications. The design of such high-performance parallel file ...
Apratim Purakayastha, Carla Schlatter Ellis, David...
167
Voted
ISCA
2012
IEEE
242views Hardware» more  ISCA 2012»
13 years 4 months ago
Side-channel vulnerability factor: A metric for measuring information leakage
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. Howeve...
John Demme, Robert Martin, Adam Waksman, Simha Set...