Sciweavers

3618 search results - page 128 / 724
» Enabling or disabling technologies
Sort
View
ICWS
2009
IEEE
14 years 6 months ago
Deactivation of Unwelcomed Deep Web Extraction Services through Random Injection
Websites serve content both through Web Services as well as through user-viewable webpages. While the consumers of web-services are typically ‘machines’, webpages are meant fo...
Varun Bhagwan, Tyrone Grandison
TEI
2010
ACM
216views Hardware» more  TEI 2010»
14 years 4 months ago
TouchTone: an electronic musical instrument for children with hemiplegic cerebral palsy
Children with hemiplegic cerebral palsy often lack the physical skills to explore their environment independently, express feelings, communicate, and successfully participate in s...
Soumitra Bhat
IPPS
2007
IEEE
14 years 3 months ago
Leakage Energy Reduction in Value Predictors through Static Decay
As process technology advances toward deep submicron (below 90nm), static power becomes a new challenge to address for energy-efficient high performance processors, especially for...
Juan M. Cebrian, Juan L. Aragón, José...
ISVLSI
2007
IEEE
121views VLSI» more  ISVLSI 2007»
14 years 3 months ago
Performance of Graceful Degradation for Cache Faults
In sub-90nm technologies, more frequent hard faults pose a serious burden on processor design and yield control. In addition to manufacturing-time chip repair schemes, microarchit...
Hyunjin Lee, Sangyeun Cho, Bruce R. Childers
IH
2007
Springer
14 years 3 months ago
YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis
Abstract. A new, simple, approach for active steganography is proposed in this paper that can successfully resist recent blind steganalysis methods, in addition to surviving distor...
Kaushal Solanki, Anindya Sarkar, B. S. Manjunath