Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
—Build systems are responsible for transforming static source code artifacts into executable software. While build systems play such a crucial role in software development and ma...
This paper presents an automatic method to customize embedded application-specific instruction processors (ASIPs) based on compiler analysis. ASIPs, also known as embedded soft c...
To accommodate heterogeneous transmission conditions in a streaming scenario several multi-rate multicast solutions have been proposed, based on simulcasting or hierarchical layer...
Facial expression recognition is necessary for designing any realistic human-machine interfaces. Previous published facial expression recognition systems achieve good recognition ...