Sciweavers

2304 search results - page 378 / 461
» On the Vulnerability of Large Graphs
Sort
View
DATE
2005
IEEE
171views Hardware» more  DATE 2005»
14 years 4 months ago
Access Pattern-Based Code Compression for Memory-Constrained Embedded Systems
As compared to a large spectrum of performance optimizations, relatively little effort has been dedicated to optimize other aspects of embedded applications such as memory space r...
Ozcan Ozturk, Hendra Saputra, Mahmut T. Kandemir, ...
EEE
2005
IEEE
14 years 4 months ago
Towards Effective Web Site Designs: A Framework for Modeling, Design Evaluation and Enhancement
Effective Web site design is critical to the success of e-commerce. Therefore, the evaluation and enhancement of a Web site design is of great importance. In this vein, accessibil...
Benjamin Yen, Paul Jen-Hwa Hu, May Wang
ICMCS
2005
IEEE
136views Multimedia» more  ICMCS 2005»
14 years 4 months ago
Human Posture Recognition with Convex Programming
We present a novel human posture recognition method using convex programming based matching schemes. Instead of trying to segment the object from the background, we develop a nove...
Hao Jiang, Ze-Nian Li, Mark S. Drew
INFOVIS
2005
IEEE
14 years 4 months ago
Vizster: Visualizing Online Social Networks
Recent years have witnessed the dramatic popularity of online social networking services, in which millions of members publicly articulate mutual "friendship" relations....
Jeffrey Heer, Danah Boyd
ISCAS
2005
IEEE
183views Hardware» more  ISCAS 2005»
14 years 4 months ago
Battery-aware dynamic voltage scaling in multiprocessor embedded system
— In a battery powered system, a primary design consideration is the battery lifetime. Profile of current drawn from a battery determines its lifetime. Recently in [4] dynamic v...
Yuan Cai, Sudhakar M. Reddy, Irith Pomeranz, Bashi...