Sciweavers

234 search results - page 9 / 47
» May We Have Your Attention: Analysis of a Selective Attentio...
Sort
View
ICASSP
2011
IEEE
12 years 11 months ago
Secure video processing: Problems and challenges
Secure signal processing is an emerging technology to enable signal processing tasks in a secure and privacy-preserving fashion. It has attracted a great amount of research attent...
Wenjun Lu, Avinash L. Varna, Min Wu
WCET
2010
13 years 5 months ago
Bounding the Effects of Resource Access Protocols on Cache Behavior
The assumption of task independence has long been consubstantial with the formulation of many schedulability analysis techniques. That assumption is evidently advantageous for the...
Enrico Mezzetti, Marco Panunzio, Tullio Vardanega
ECRTS
2006
IEEE
14 years 1 months ago
WCET-Centric Software-controlled Instruction Caches for Hard Real-Time Systems
Cache memories have been extensively used to bridge the gap between high speed processors and relatively slower main memories. However, they are sources of predictability problems...
Isabelle Puaut
CVIU
2008
75views more  CVIU 2008»
13 years 7 months ago
Performance characterization in computer vision: A guide to best practices
It is frequently remarked that designers of computer vision algorithms and systems cannot reliably predict how algorithms will respond to new problems. A variety of reasons have b...
Neil A. Thacker, Adrian F. Clark, John L. Barron, ...
IADIS
2003
13 years 8 months ago
Selecting an Approach to Designing Group Support Systems
The increasing demand for group support in software has drawn more attention to the field of designing Group Support Systems. Notwithstanding all the research in this field the pr...
Jeroen van den Heuvel, Kees van Slooten, Roy Tai