: 2-D Discrete Cosine Transform (DCT) is widely used as the core of digital image and video compression. In this paper, we present a novel DCT architecture that allows aggressive v...
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
– A wearable sensory system for human lower extremity motion analysis is proposed, and an intelligent computation method for this sensory system is presented. The standard method...
Tao Liu, Yoshio Inoue, Kyoko Shibata, Haruhiko Mor...
The goal of the CONTROL project at Berkeley is to develop systems for interactive analysis of large data sets. We focus on systems that provide users with iteratively refining answ...
Joseph M. Hellerstein, Ron Avnur, Vijayshankar Ram...
Abstract. Parallel shared memory (PSM) routers represent an architectural approach for addressing the high memory bandwidth requirements dictated by output-queued switches. A funda...