Sciweavers

161 search results - page 27 / 33
» Performance Evaluation of Fingerprint Verification Systems
Sort
View
USENIX
2008
13 years 9 months ago
Idle Read After Write - IRAW
Despite a low occurrence rate, silent data corruption represents a growing concern for storage systems designers. Throughout the storage hierarchy, from the file system down to th...
Alma Riska, Erik Riedel
CVPR
2008
IEEE
14 years 9 months ago
Lost in quantization: Improving particular object retrieval in large scale image databases
The state of the art in visual object retrieval from large databases is achieved by systems that are inspired by text retrieval. A key component of these approaches is that local ...
James Philbin, Ondrej Chum, Michael Isard, Josef S...
EMSOFT
2006
Springer
13 years 11 months ago
Modeling a system controller for timing analysis
Upper bounds on worst-case execution times, which are commonly called WCET, are a prerequisite for validating the temporal correctness of tasks in a real-time system. Due to the e...
Stephan Thesing
ATAL
2009
Springer
14 years 1 months ago
Graph-based methods for the analysis of large-scale multiagent systems
Multiagent systems are often characterized by complex, and sometimes unpredictable interactions amongst their autonomous components. While these systems can provide robust and sca...
Wilbur Peng, William Krueger, Alexander Grushin, P...
MOBIHOC
2002
ACM
14 years 7 months ago
Directional virtual carrier sensing for directional antennas in mobile ad hoc networks
This paper presents a new carrier sensing mechanism called DVCS (Directional Virtual Carrier Sensing) for wireless communication using directional antennas. DVCS does not require ...
Mineo Takai, Jay Martin, Rajive Bagrodia, Aifeng R...