Sciweavers

3018 search results - page 107 / 604
» Leveraging the
Sort
View
ICCD
2008
IEEE
122views Hardware» more  ICCD 2008»
14 years 6 months ago
Acquiring an exhaustive, continuous and real-time trace from SoCs
— The amount of time and resources that have to be spent on debugging of embedded cores continuously increases. Approaches valid 10 years ago can no longer be used due to the var...
Christian Hochberger, Alexander Weiss
CVPR
2010
IEEE
14 years 5 months ago
Unified Graph Matching in Euclidean Spaces
Graph matching is a classical problem in pattern recognition with many applications, particularly when the graphs are embedded in Euclidean spaces, as is often the case for comput...
Julian McAuley, Teofilo de Campos, Tiberio Caetano
CISIS
2010
IEEE
14 years 3 months ago
On a Journey from Message to Observable Pervasive Application
—Bringing together heterogeneous computing devices and appliances gives rise to a spontaneous environment where resources exchange messages, such as a mobile phone telling the ca...
Geert Vanderhulst, Kris Luyten, Karin Coninx
HICSS
2010
IEEE
180views Biometrics» more  HICSS 2010»
14 years 3 months ago
Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity
Users are being tracked on the Internet more than ever before as Web sites and search engines gather pieces of information sufficient to identify and study their behavior. While m...
Craig A. Shue, Minaxi Gupta
ICDE
2010
IEEE
183views Database» more  ICDE 2010»
14 years 3 months ago
Estimating the compression fraction of an index using sampling
—Data compression techniques such as null suppression and dictionary compression are commonly used in today’s database systems. In order to effectively leverage compression, it...
Stratos Idreos, Raghav Kaushik, Vivek R. Narasayya...