Sciweavers

1262 search results - page 233 / 253
» Fast Robust Hashing
Sort
View
VEE
2009
ACM
107views Virtualization» more  VEE 2009»
14 years 5 months ago
Architectural support for shadow memory in multiprocessors
Runtime monitoring support serves as a foundation for the important tasks of providing security, performing debugging, and improving performance of applications. Often runtime mon...
Vijay Nagarajan, Rajiv Gupta
SASO
2007
IEEE
14 years 5 months ago
e-SAFE: An Extensible, Secure and Fault Tolerant Storage System
With the rapidly falling price of hardware, and increasingly available bandwidth, the storage technology is seeing a paradigm shift from centralized and managed mode to distribute...
Sandip Agarwala, Arnab Paul, Umakishore Ramachandr...
SIGUCCS
2005
ACM
14 years 4 months ago
Imaging, security, configuration, and maintenance for the masses
Educational Partnerships and Learning Technologies (EPLT) [1] at the University of Washington maintains and supports a fleet of approximately 1,000 general-access student computin...
Brandon Koeller, Karalee Woody
MICCAI
2000
Springer
14 years 2 months ago
Intraoperative Segmentation and Nonrigid Registration for Image Guided Therapy
Our goal was to improve image guidance during minimally invasive image guided therapy by developing an intraoperative segmentation and nonrigid registration algorithm. The algorith...
Simon K. Warfield, Arya Nabavi, Torsten Butz, Kema...
DAS
2010
Springer
14 years 2 months ago
Handwritten Arabic text line segmentation using affinity propagation
In this paper, we present a novel graph-based method for extracting handwritten text lines in monochromatic Arabic document images. Our approach consists of two steps Coarse text ...
Jayant Kumar, Wael Abd-Almageed, Le Kang, David S....