Sciweavers

5365 search results - page 953 / 1073
» Hierarchical Information Maps
Sort
View
USS
2008
14 years 13 days ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
ICPR
2010
IEEE
14 years 3 days ago
Compressing Sparse Feature Vectors Using Random Ortho-Projections
In this paper we investigate the usage of random ortho-projections in the compression of sparse feature vectors. The study is carried out by evaluating the compressed features in ...
Esa Rahtu, Mikko Salo, Janne Heikkilä
ARC
2008
Springer
112views Hardware» more  ARC 2008»
14 years 3 days ago
Optimal Unroll Factor for Reconfigurable Architectures
Abstract. Loops are an important source of optimization. In this paper, we address such optimizations for those cases when loops contain kernels mapped on reconfigurable fabric. We...
Ozana Silvia Dragomir, Elena Moscu Panainte, Koen ...
ASSETS
2008
ACM
14 years 3 days ago
Refreshable tactile graphics applied to schoolbook illustrations for students with visual impairment
This article presents research on making schoolbook illustrations accessible for students with visual impairment. The MaskGen system was developed to interactively transpose illus...
Grégory Petit, Aude Dufresne, Vincent L&eac...
ATAL
2008
Springer
14 years 3 days ago
Continual collaborative planning for mixed-initiative action and interaction
Multiagent environments are often highly dynamic and only partially observable which makes deliberative action planning computationally hard. In many such environments, however, a...
Michael Brenner