Sciweavers

15781 search results - page 3054 / 3157
» Evaluating Information Extraction
Sort
View
IROS
2008
IEEE
148views Robotics» more  IROS 2008»
15 years 10 months ago
Identifying a moving object with an accelerometer in a camera view
— This paper proposes a method for identifying an object which contains an accelerometer out of many moving objects in the view of a stationary camera using motion data obtained ...
Osamu Shigeta, Shingo Kagami, Koichi Hashimoto
178
Voted
ISPASS
2008
IEEE
15 years 10 months ago
Dynamic Thermal Management through Task Scheduling
The evolution of microprocessors has been hindered by their increasing power consumption and the heat generation speed on-die. High temperature impairs the processor’s reliabili...
Jun Yang 0002, Xiuyi Zhou, Marek Chrobak, Youtao Z...
158
Voted
MICRO
2008
IEEE
131views Hardware» more  MICRO 2008»
15 years 10 months ago
Token flow control
As companies move towards many-core chips, an efficient onchip communication fabric to connect these cores assumes critical importance. To address limitations to wire delay scala...
Amit Kumar 0002, Li-Shiuan Peh, Niraj K. Jha
145
Voted
SECON
2008
IEEE
15 years 10 months ago
Practical Algorithms for Gathering Stored Correlated Data in a Network
—Many sensing systems remotely monitor/measure an environment at several sites, and then report these observations to a central site. We propose and investigate several practical...
Ramin Khalili, James F. Kurose
ACSAC
2007
IEEE
15 years 10 months ago
Automated Security Debugging Using Program Structural Constraints
Understanding security bugs in a vulnerable program is a non-trivial task, even if the target program is known to be vulnerable. Though there exist debugging tools that facilitate...
Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan...
« Prev « First page 3054 / 3157 Last » Next »