Sciweavers

2948 search results - page 196 / 590
» More Principled Design of Pervasive Computing Systems
Sort
View
PLDI
2011
ACM
14 years 7 months ago
EnerJ: approximate data types for safe and general low-power computation
Energy is increasingly a first-order concern in computer systems. Exploiting energy-accuracy trade-offs is an attractive choice in applications that can tolerate inaccuracies. Re...
Adrian Sampson, Werner Dietl, Emily Fortuna, Danus...
LCPC
2007
Springer
15 years 10 months ago
Revisiting SIMD Programming
Massively parallel SIMD array architectures are making their way into embedded processors. In these architectures, a number of identical processing elements having small private st...
Anton Lokhmotov, Benedict R. Gaster, Alan Mycroft,...
ICDAR
2009
IEEE
15 years 2 months ago
A Multi-Hypothesis Approach for Off-Line Signature Verification with HMMs
In this paper, an approach based on the combination of discrete Hidden Markov Models (HMMs) in the ROC space is proposed to improve the performance of off-line signature verificat...
Luana Batista, Eric Granger, Robert Sabourin
STORAGESS
2005
ACM
15 years 10 months ago
Toward a threat model for storage systems
The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the l...
Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Y...
CVPR
1999
IEEE
15 years 8 months ago
A Volumetric Stereo Matching Method: Application to Image-Based Modeling
We formulate stereo matching as an extremal surface extraction problem. This is made possible by embedding the disparity surface inside a volume where the surface is composed of v...
Qian Chen, Gérard G. Medioni