Sciweavers

348 search results - page 62 / 70
» Experiences in Hardware Trojan Design and Implementation
Sort
View
MM
2005
ACM
141views Multimedia» more  MM 2005»
14 years 1 months ago
SEVA: sensor-enhanced video annotation
In this paper, we study how a sensor-rich world can be exploited by digital recording devices such as cameras and camcorders to improve a user’s ability to search through a larg...
Xiaotao Liu, Mark D. Corner, Prashant J. Shenoy
SBCCI
2005
ACM
98views VLSI» more  SBCCI 2005»
14 years 1 months ago
Mapping embedded systems onto NoCs: the traffic effect on dynamic energy estimation
This work addresses the problem of application mapping in networks-on-chip (NoCs). It explores the importance of characterizing network traffic to effectively predict NoC energy c...
José Carlos S. Palma, César A. M. Ma...
MOBICOM
2010
ACM
13 years 7 months ago
Inferring and mitigating a link's hindering transmissions in managed 802.11 wireless networks
In 802.11 managed wireless networks, the manager can address under-served links by rate-limiting the conflicting nodes. In order to determine to what extent each conflicting node ...
Eugenio Magistretti, Omer Gurewitz, Edward W. Knig...
HIPC
2009
Springer
13 years 5 months ago
Comparing the performance of clusters, Hadoop, and Active Disks on microarray correlation computations
Abstract--Microarray-based comparative genomic hybridization (aCGH) offers an increasingly fine-grained method for detecting copy number variations in DNA. These copy number variat...
Jeffrey A. Delmerico, Nathanial A. Byrnes, Andrew ...
TON
2010
115views more  TON 2010»
13 years 2 months ago
Feedback-Based Scheduling for Load-Balanced Two-Stage Switches
Abstract--A framework for designing feedback-based scheduling algorithms is proposed for elegantly solving the notorious packet missequencing problem of a load-balanced switch. Unl...
Bing Hu, Kwan L. Yeung