Sciweavers

1016 search results - page 137 / 204
» Explore or Exploit
Sort
View
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
14 years 2 months ago
From Computer Networks to Agent Networks
From the 1990s on, one of the most important challenges facing computer science researchers has been the design and construction of software tools to exploit Internet computing. A...
Guoqiang Zhong, Kenichi Takahashi, Satoshi Amamiya...
MICRO
2003
IEEE
95views Hardware» more  MICRO 2003»
14 years 2 months ago
Processor Acceleration Through Automated Instruction Set Customization
Application-specific extensions to the computational capabilities of a processor provide an efficient mechanism to meet the growing performance and power demands of embedded appl...
Nathan Clark, Hongtao Zhong, Scott A. Mahlke
PG
2003
IEEE
14 years 2 months ago
Depth-Peeling for Texture-Based Volume Rendering
We present the concept of volumetric depth-peeling. The proposed method is conceived to render interior and exterior iso-surfaces for a fixed iso-value and to blend them without ...
Zoltán Nagy, Reinhard Klein
SSDBM
2003
IEEE
137views Database» more  SSDBM 2003»
14 years 2 months ago
Supporting Sliding Window Queries for Continuous Data Streams
Although traditional databases and data warehouses have been exploited widely to manage persistent data, a large number of applications from sensor network need functional support...
Lin Qiao, Divyakant Agrawal, Amr El Abbadi
DAC
2003
ACM
14 years 2 months ago
Test application time and volume compression through seed overlapping
We propose in this paper an extension on the Scan Chain Concealment technique to further reduce test time and volume requirement. The proposed methodology stems from the architect...
Wenjing Rao, Ismet Bayraktaroglu, Alex Orailoglu