Sciweavers

6198 search results - page 1114 / 1240
» Multi-Paradigm Process Management
Sort
View
ISCA
2006
IEEE
154views Hardware» more  ISCA 2006»
14 years 4 months ago
SODA: A Low-power Architecture For Software Radio
The physical layer of most wireless protocols is traditionally implemented in custom hardware to satisfy the heavy computational requirements while keeping power consumption to a ...
Yuan Lin, Hyunseok Lee, Mark Woh, Yoav Harel, Scot...
NOMS
2006
IEEE
146views Communications» more  NOMS 2006»
14 years 4 months ago
BGP-Inspect - Extracting Information from Raw BGP Data
— While BGP routing datasets, consisting of raw routing data, are freely available and easy to obtain, extracting any useful information is tedious. Currently, researcher and net...
Dionysus Blazakis, Manish Karir, John S. Baras
ETRA
2006
ACM
101views Biometrics» more  ETRA 2006»
14 years 4 months ago
Gaze-contingent temporal filtering of video
We describe an algorithm for manipulating the temporal resolution of a video in real time, contingent upon the viewer’s direction of gaze. The purpose of this work is to study t...
Martin Böhme, Michael Dorr, Thomas Martinetz,...
SAC
2006
ACM
14 years 4 months ago
The impact of sample reduction on PCA-based feature extraction for supervised learning
“The curse of dimensionality” is pertinent to many learning algorithms, and it denotes the drastic raise of computational complexity and classification error in high dimension...
Mykola Pechenizkiy, Seppo Puuronen, Alexey Tsymbal
SACMAT
2006
ACM
14 years 4 months ago
Fine-grained role-based delegation in presence of the hybrid role hierarchy
Delegation of authority is an important process that needs to be captured by any access control model. In role-based access control models, delegation of authority involves delega...
James B. D. Joshi, Elisa Bertino
« Prev « First page 1114 / 1240 Last » Next »