Sciweavers

858 search results - page 31 / 172
» One Is Enough!
Sort
View
ICPP
2000
IEEE
14 years 1 months ago
Partial Resolution in Data Value Predictors
Recently, the practice of speculation in resolving data dependences has been studied as a means of extracting more instruction level parallelism (ILP). An outcome of an instructio...
Toshinori Sato, Itsujiro Arita
WETICE
2000
IEEE
14 years 1 months ago
A Web Infrastructure for People and Agent Interaction and Collaboration
Internet pervasive services call for flexible supports to enable a wide degree of collaboration. On the one hand, many people are connected to the Internet and surf the Web not on...
Giacomo Cabri, Letizia Leonardi, Franco Zambonelli
ICDAR
1999
IEEE
14 years 1 months ago
Robust Skew Estimation on Low-Resolution Document Images
In this paper, we present a new technique for estimating an arbitrary skew angle using a simple and efficient text row accumulation based on the statistics of the 1st and 2nd orde...
Oleg Okun, Matti Pietikäinen, Jaakko J. Sauvo...
SP
1999
IEEE
155views Security Privacy» more  SP 1999»
14 years 1 months ago
Software Smart Cards via Cryptographic Camouflage
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys using cryptographic camouflage. Specifically, we do ...
Douglas N. Hoover, B. N. Kausik
SRDS
1999
IEEE
14 years 1 months ago
Fault-Tolerant Replication Management in Large-Scale Distributed Storage Systems
Failures of all forms happen: from losing single network packets to site-wide disasters. Since businesses rely heavily on their data, it is imperative that failures require minima...
Richard A. Golding, Elizabeth Borowsky