Sciweavers

613 search results - page 43 / 123
» Matching Power
Sort
View
WOA
2010
13 years 7 months ago
Using Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Marco Tranquillin, Carlo Ferrari, Michele Moro
ASPLOS
2010
ACM
14 years 4 months ago
Conservation cores: reducing the energy of mature computations
Growing transistor counts, limited power budgets, and the breakdown of voltage scaling are currently conspiring to create a utilization wall that limits the fraction of a chip tha...
Ganesh Venkatesh, Jack Sampson, Nathan Goulding, S...
MM
2003
ACM
120views Multimedia» more  MM 2003»
14 years 2 months ago
Linking multimedia presentations with their symbolic source documents: algorithm and applications
An algorithm is presented that automatically matches images of presentation slides to the symbolic source file (e.g., PowerPointTM or AcrobatTM ) from which they were generated. T...
Berna Erol, Jonathan J. Hull, Dar-Shyang Lee
ISCA
2008
IEEE
105views Hardware» more  ISCA 2008»
14 years 4 months ago
Intra-disk Parallelism: An Idea Whose Time Has Come
Server storage systems use a large number of disks to achieve high performance, thereby consuming a significant amount of power. In this paper, we propose to significantly reduc...
Sriram Sankar, Sudhanva Gurumurthi, Mircea R. Stan
PE
2008
Springer
81views Optimization» more  PE 2008»
13 years 9 months ago
Using cross-system diversity in heterogeneous networks: Throughput optimization
This paper investigates the situation where a group of terminals can be simultaneously connected to several base stations using distinct technologies on nonoverlapping frequency b...
Samson Lasaulce, Alberto Suárez 0002, Raul ...