Sciweavers

209 search results - page 11 / 42
» Establishing Persistent Identity using the Handle System
Sort
View
FTDCS
2003
IEEE
14 years 29 days ago
pFilter: Global Information Filtering and Dissemination Using Structured Overlay Networks
The exponential data growth rate of the Internet makes it increasingly difficult for people to find desired information in a timely fashion. Information filtering and dissemina...
Chunqiang Tang, Zhichen Xu
ICASSP
2011
IEEE
12 years 11 months ago
Authentication of fingerprint scanners
Fingerprint scanners have unique patterns that can be used to distinguish one scanner from another one. The pattern, which we call scanner pattern, stems from the variability of d...
Vladimir I. Ivanov, John S. Baras
EXPDB
2006
ACM
14 years 1 months ago
Pushing XPath Accelerator to its Limits
Two competing encoding concepts are known to scale well with growing amounts of XML data: XPath Accelerator encoding implemented by MonetDB for in-memory documents and X-Hive’s ...
Christian Grün, Alexander Holupirek, Marc Kra...
DFT
2006
IEEE
74views VLSI» more  DFT 2006»
14 years 1 months ago
Recovery Mechanisms for Dual Core Architectures
Dual core architectures are commonly used to establish fault tolerance on the node level. Since comparison is usually performed for the outputs only, no precise diagnostic informa...
Christian El Salloum, Andreas Steininger, Peter Tu...
VTC
2008
IEEE
203views Communications» more  VTC 2008»
14 years 2 months ago
A Dual-Band HF / UHF Antenna for RFID Tags
—Conventional RFID (radio frequency identification) systems operating at one single carrier frequency can hardly handle the great variety of shapes and materials that occur in p...
Lukas W. Mayer, Arpad L. Scholtz