Sciweavers

2028 search results - page 238 / 406
» Highly Predictive Blacklisting
Sort
View
ICS
2009
Tsinghua U.
14 years 4 months ago
Adagio: making DVS practical for complex HPC applications
Power and energy are first-order design constraints in high performance computing. Current research using dynamic voltage scaling (DVS) relies on trading increased execution time...
Barry Rountree, David K. Lowenthal, Bronis R. de S...
CSE
2009
IEEE
14 years 4 months ago
Surfing a Web of Trust: Reputation and Reciprocity on CouchSurfing.com
—Reputation mechanisms are essential for online transactions, where the parties have little prior experience with one another. This is especially true when transactions result in...
Debra Lauterbach, Hung Truong, Tanuj Shah, Lada A....
IH
2009
Springer
14 years 3 months ago
Detect Digital Image Splicing with Visual Cues
Image splicing detection has been considered as one of the most challenging problems in passive image authentication. In this paper, we propose an automatic detection framework to ...
Zhenhua Qu, Guoping Qiu, Jiwu Huang
DFT
2008
IEEE
138views VLSI» more  DFT 2008»
14 years 3 months ago
Exploring Density-Reliability Tradeoffs on Nanoscale Substrates: When do smaller less reliable devices make sense?
It is widely recognized that device and interconnect fabrics at the nanoscale will be characterized by an increased susceptibility to transient faults. This appears to be intrinsi...
Andrey V. Zykov, Gustavo de Veciana
ISCAS
2008
IEEE
110views Hardware» more  ISCAS 2008»
14 years 3 months ago
Distortion calculation of an asynchronous switching xDSL line-driver
Abstract—Since the xDSL specifications impose stringent linearity requirements to ensure the integrity of the data transferred, current line drivers use linear amplifiers. The do...
Vincent De Gezelle, Jordie Buyle, Jan Doutreloigne