Sciweavers

7404 search results - page 1397 / 1481
» New Tools in Education
Sort
View
ACSAC
2005
IEEE
14 years 3 months ago
Stealth Breakpoints
Microscopic analysis of malicious code (malware) requires the aid of a variety of powerful tools. Chief among them is a debugger that enables runtime binary analysis at an instruc...
Amit Vasudevan, Ramesh Yerraballi
AUTOID
2005
IEEE
14 years 3 months ago
Fully Automated Facial Symmetry Axis Detection in Frontal Color Images
In this paper, we consider the problem of automatically detecting a facial symmetry axis in what we will call a standard human face image (acquired when the subject is looking dir...
Xin Chen, Patrick J. Flynn, Kevin W. Bowyer
GLVLSI
2005
IEEE
99views VLSI» more  GLVLSI 2005»
14 years 3 months ago
An empirical study of crosstalk in VDSM technologies
We perform a detailed study of various crosstalk scenarios in VDSM technologies by using a distributed model of the crosstalk site and make a number of key observations about the ...
Shahin Nazarian, Massoud Pedram, Emre Tuncer
ICDCSW
2005
IEEE
14 years 3 months ago
Control Theory Optimization of MECN in Satellite Networks
Congestion in the Internet results in wasted bandwidth and also stands in the way of guaranteeing QoS. The effect of congestion is multiplied many fold in Satellite networks, wher...
Arjan Durresi, Mukundan Sridharan, Sriram Chellapp...
ICDE
2005
IEEE
122views Database» more  ICDE 2005»
14 years 3 months ago
Autonomous Index Optimization in XML Databases
Abstract— Defining suitable indexes is a major task when optimizing a database. Usually, a human database administrator defines a set of indexes in the design phase of the data...
Beda Christoph Hammerschmidt, Martin Kempa, Volker...
« Prev « First page 1397 / 1481 Last » Next »