Sciweavers

2261 search results - page 315 / 453
» Dynamic types for authentication
Sort
View

Publication
363views
12 years 8 months ago
Detecting and Discriminating Behavioural Anomalies
This paper aims to address the problem of anomaly detection and discrimination in complex behaviours, where anomalies are subtle and difficult to detect owing to the complex tempor...
Chen Change Loy, Tao Xiang, Shaogang Gong
WACV
2012
IEEE
12 years 4 months ago
Simultaneous inference of activity, pose and object
Human movements are important cues for recognizing human actions, which can be captured by explicit modeling and tracking of actor or through space-time low-level features. Howeve...
Furqan M. Khan, Vivek Kumar Singh, Ram Nevatia
HIPEAC
2007
Springer
14 years 3 months ago
Fetch Gating Control Through Speculative Instruction Window Weighting
In a dynamic reordering superscalar processor, the front-end fetches instructions and places them in the issue queue. Instructions are then issued by the back-end execution core. T...
Hans Vandierendonck, André Seznec
ISLPED
2003
ACM
129views Hardware» more  ISLPED 2003»
14 years 2 months ago
A critical analysis of application-adaptive multiple clock processors
Enabled by the continuous advancement in fabrication technology, present day synchronous microprocessors include more than 100 million transistors and have clock speeds well in ex...
Emil Talpes, Diana Marculescu
POPL
2000
ACM
14 years 1 months ago
Enforcing Trace Properties by Program Transformation
We propose an automatic method to enforce trace properties on programs. The programmer specifies the property separately from the program; a program transformer takes the program...
Thomas Colcombet, Pascal Fradet